c_ctx={0xd, 0x18, 0x20, 0x6, 0x60, "55682d1833a467de5baf6a1824357684ffda84a5b650902b121c46dc88e370bea86c5895aa5a60c5fecd7c059bf16de523ed94cd86e4fed1b67b082a5169de851de1624ec089f47bee77275da154ffdc6506c29c8bf1f57e9bf1c74170cad670"}, @sadb_x_sa2={0x2, 0x13, 0x815, 0x0, 0x0, 0x70bd2a, 0x3503}, @sadb_lifetime={0x4, 0x0, 0x3ff, 0x4, 0x3, 0x2}]}, 0xe0}}, 0x40080) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x3cf) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000540)='sysfs\x00', 0x6) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x124, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xd1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80000001}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x23}}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb41}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x640b}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x40}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6df}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x12}}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5d}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x124}}, 0x20008040) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:09 executing program 0: r0 = getpgrp(0x0) ioprio_get$pid(0x2, r0) 21:06:09 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) 21:06:09 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpid() getpgid(0x0) getpgrp(r0) [ 523.910193] protocol 88fb is buggy, dev hsr_slave_0 [ 523.915361] protocol 88fb is buggy, dev hsr_slave_1 21:06:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) 21:06:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000500)=0x1e) 21:06:09 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0xb0340, 0x0) sendmsg$netlink(r1, 0xfffffffffffffffd, 0x4000000) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) syz_open_dev$dmmidi(&(0x7f0000000680)='/dev/dmmidi#\x00', 0x0, 0x4400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='sy\xe4\xb7`\x7f!\x84\xb7fs\x00\x00\xe9\xff\xff\xff\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r3, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, r0, 0x0, 0x2b, &(0x7f0000000580)='eth0cgroup&vmnet0proc!vmnet0system&bdev*..\x00'}, 0x354) fcntl$lock(r1, 0x27, &(0x7f0000000600)={0x3, 0x1, 0x46, 0x10001, r5}) bind$inet6(r1, &(0x7f0000000440)={0xa, 0x4e23, 0x5, @empty, 0x8c72}, 0x1c) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r6, 0x20}, &(0x7f0000000240)=0x8) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000480)={'erspan0\x00', 0x8}) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) openat$usbmon(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/usbmon0\x00', 0x0, 0x0) 21:06:09 executing program 0: r0 = getpgrp(0x0) ioprio_get$pid(0x3, r0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r0) 21:06:09 executing program 0: r0 = getpgrp(0x0) ioprio_set$pid(0x3, r0, 0x8) ioprio_get$pid(0x4, r0) [ 524.310130] protocol 88fb is buggy, dev hsr_slave_0 [ 524.315260] protocol 88fb is buggy, dev hsr_slave_1 [ 524.390120] protocol 88fb is buggy, dev hsr_slave_0 [ 524.395265] protocol 88fb is buggy, dev hsr_slave_1 21:06:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000340)={{0x4, 0x6}, 'port0\x00', 0x44, 0x90000, 0x6, 0x7ff, 0x9, 0x6, 0x5d, 0x0, 0x1, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) io_setup(0x9, &(0x7f0000000000)=0x0) r2 = dup3(r0, r0, 0x80000) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x1b, 0x1, "45f2de5c4c0cf6d42d8fbab96bdf3405edcffd23bdedebc329dad7fdbfecc6b4cddfecda2151a7c4d69db32332a7792870c82d1669cbf6f97ec38adeaf003095", "67152952aa713960517f69dd998ab82b2f51c8f94661c1c97a3f2e6b62ff2032", [0x1, 0x2]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x800, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000300)=@gcm_256={{0x303}, "d08ef8e75fa9a27a", "130568bf9cac1e61f8d9947f039d4453c34953be0bab3d214cf6023729d6c7b3", "78fb2916", "1ec89aab1766f8a0"}, 0x38) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x7f, @ipv4={[], [], @empty}, 0x6e}, 0x1c) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4000000000000, r0, &(0x7f0000000040)="fc15670f51e5bffaa549baa8061c2981e830b19264dc411b96fed091bfcccbe18494d1956be0f6bad9bd6597273dae5293a0af409c9baf16880c11f7f33e91cab6f70844fa70b1989bd599fbc1be3dd4472901ecd8faea5c4061b9995b0717b7392396db7cfb53d384fe84a31f62adfe5937b8978515fb2cf2947ee75bd101cc89457650ac4c718a7a2738eec90350575cd5f0b5f81865a32f68eb3785f664e0deaaab81007cbee02587d454e848424357efa4920559bc38cb6305363605856d3199b45ed49910b14b3bbc635317aa4f8013a5ebb26a5cf89f43a141bc3adb9e6872e3d0b79dba8f4c64c5b3ec43c5119f8f2b296ace51", 0xf7, 0x6, 0x0, 0x3, r2}, &(0x7f0000000180)) 21:06:10 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') chdir(&(0x7f0000000280)='./file1\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:10 executing program 0: r0 = getpgrp(0x0) ioprio_get$pid(0x3, r0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000080)=0x3, 0x4) 21:06:10 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:10 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) 21:06:10 executing program 0: gettid() getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) getpid() syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x9, 0x90540) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r1 = getpgrp(r0) ioprio_get$pid(0x3, r1) 21:06:10 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x140) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0], 0x2, 0x1, 0x2, 0x1}) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000080)="d39d0f1c0a724a035aa2afc4a967d3dc34957160ff315038722003c34a057d7a39baba91d6191af23cb32a1a3a25196de962e1", 0x33}, {&(0x7f00000000c0)="64c603d9a52696f5120e01632c39d7f6b9b8557f7352f7", 0x17}, {&(0x7f0000000100)="caaf5be545e78e73188b6ce916f4ee9e328c1d40a93ef17ba4c4e73c338fa82334715b2d4eab695ce9644279c1415e0a5e16a6d55305890dc68169982dc99a912b5a0a8a6be641b93d89c28b495d2573e8b8", 0x52}, {&(0x7f0000000180)="7447010871eaeb4a5f786f7bd8e56931c11b958f0e4be805141764a831692b5f8806eb292ad0dfe9f733f96aafcb9ed3c1b5a53c8f56c3ef157feaec8dab25b7a8b283b511f102571ae62fc778201302963e5cf46c19f0aacdced18b1f659c41f6787d44ac3d262731d7122d90e6b1fbaf3f6df4f0b774fa018ad35cb4344d03", 0x80}, {&(0x7f0000000200)="16b2721366feb97539e498528d528714f2a550d38fb52a4a59558fc25fa4d90e2038778cf298a77282deae3937", 0x2d}], 0x6, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) 21:06:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c4cc43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9817, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(r0, 0x6, 0x3d, &(0x7f00000003c0)=""/128, &(0x7f0000000200)=0x33a) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:10 executing program 0: r0 = getpgrp(0x0) ioprio_get$pid(0x3, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x2000) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xf4, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x0, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'irlan0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x850}, 0xfffffffffffffffd) 21:06:10 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000440)=0x7f, 0x4) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f00000004c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000008c0)={0x8, 0x120, 0xfa00, {0x2, {0x80, 0x40, "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", 0x81, 0x8001, 0x8, 0x3, 0x7, 0x5, 0xda}, r3}}, 0x128) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000280)={0x3, 0x4, 0x7, {0x0, 0x989680}, 0xbe2, 0x64}) sendmmsg$sock(r4, &(0x7f0000002740)=[{{&(0x7f0000000580)=@nl=@unspec, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000680)="436592193a2a86933220314cee9e89a2039f433117b783121cfc71c7761d5645a1293c14431623fae3914fc0017414686c29d1e43648488bd411177b9dcae11c18e616fd8033a2b48cc77c1821a73749278791521df66af9441e0ae306d9186913cb02b9bf3deb40597775df6f62c4a317b1a858d3d11f7fd1f6820dedd66b5bcf18433135fe2b11182184efd8b634b6f09b67ad865933d7bb20e5a6ffe9d3e516c550336788c9166bbdb0dc2660bd43cea290076de188e14724e80f0fbb02b2351d8b675bcc6d7fad36b9362d28f72f046d2bc4f7358731ead40f6833030c3fb7445b", 0xe3}, {&(0x7f0000000600)="9eac01670c1eb10ec3c9c914dc2ee007e2bbdf756b9ccf24e6068617d5a11f6363e86886dc80dbec0f2196", 0x2b}, {&(0x7f0000000bc0)="f0347969e8935d4ff30f5e5f2102e6298d94ecd5118f8afb9a5452e5873ac8c9d90aa79210d6142726d5c77caa57c1dab03dc4070831d19d8e5f76a7b2a1037a842fc12d34892b0426a5708d747927af769f84fececc85798e09b458946b73d8d881b2179916f356148b5f45e4573e1537e325d617fd6f2c1969e3d0000c2a581340fe7f5d2f864dc319e3cf5194cc23a91b98efaed570e0dad15e95560ebdf9c0b82db01b55bad450ed", 0xaa}, {&(0x7f0000000a00)="d1146c457144906adc532295c1b15baa061f5a83cd0fbbd413d802ebbb3fbaa1e5e1c0735223df51f75d4833df2204bb427375171cbcc7371ce171ddba47e80a666276ad1e7239e98a57e8eb6282d92d9866b2972fa2122c0879a473", 0x5c}], 0x4, &(0x7f0000000cc0)=[@timestamping={{0x14, 0x1, 0x25, 0x80000001}}], 0x18}}, {{&(0x7f0000000d00)=@generic={0x9, "01b065cbc14518973fa2ae9b21af2611fa3a535e47fbd43621dced8a4f0d6dc42733fe70b903d4998b548cff42b90d44ba3ea40bc3f34d66d51aa2b048742cb8aa3f66fab2a0fb4094fc96e44f5681d17fb6eefb7b95a8e8d6f5cb28f3cb6eb63c755d806ffae82f780df6fb86fbb7170aab8bb5f58a46d948a7f5fb620b"}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000d80)="1414dc0eb8b876baf23b716159c87c36acf9862890352a3715", 0x19}, {&(0x7f0000000dc0)="042ae73e64f01687ece940f9011c8074ed375559afdf28dc5903b1b81f7230550993671aa72adfff369e5d3207c538c90c75dafee1332784e8f808d19afd158a9a6dd0573500b95dd29a66a3ed15b7f7b900c17e04af5049e53ea7cc6a5f246565dd66b8ee2592338f7a06d2", 0x6c}, {&(0x7f0000000e40)="5fb74b8cdb0378c3ac24b6f1b17265eac3023fdb423619277040d2f101d391d6254366479662582289b01967419c20d9c025eeaa721d74ac87aab5c929010f6a7613e238d353cfc330853c2e50e8c9d6914a9b59c0968e8c6bbd10fdcb92a59e223090ecb32287772bb9cc076c6ca3399dbb918edb4de2291372de6f4d6688d7857f925c", 0x84}, {&(0x7f0000000f00)="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", 0x1000}, {&(0x7f0000001f00)="73abee13a3cfa7fb1ae65b2c8937d7c95975d7d390d450182e29632698220ab78aafe9c5ed419065a3fc89c83c1948588c66d68479f7094406dccbed8057bd54d3c26f9619570b1ce57b714416a18d53eac70b981c13a08bdd1729e99604ba134c3b9a32ded4210eca71d25dbb9541337002ef6894404321da4277ac06a8990f2ea30033abd6cb14c64ed5d0819c52", 0x8f}, {&(0x7f0000001fc0)="e568a8f3d498fb46677222c7a0e5297a548fa46bb8e2ec494c6adca96f72ea31863f1e122c58a01bc9d3ad652700c89d20d5be6179b391f2f9c6a0f925913c09f706d0fa27febfc8a114e49f473ab11c97864d5369cad637fa981bfbd9414461c7d9781f66c1845c6f868ebcc525e0597f862ad1eb32a3b54aa46fc71649f2b36e191191a12b090aba02851df9152d7b7a6aaee95485a2dccb186da770f89a7bcee550d03102", 0xa6}, {&(0x7f0000002080)="9c8232429486fef2c5130c3ae344b6a9e885279d1ede5131fff9c718406697766cd2fb2b3d4ed39ff6891b642bfb47599c7f01d274f07bdf97b7419a2301d8f6912ed719b7efa023d49d2bd3b38ca50f55c5d8aa48208a557a3226c587", 0x5d}, {&(0x7f0000002100)="1cfb2c6028465c1a00613274bb92e30a6f39b6b3fa7c1341f7dd485e6d6d917fc3cdb9073da3acbe5fb76aa3f2fb980aa1a6e713e717519faa7faddb461db7bf80307a0d4d9f8600423520c80efbab24236dd20e779f29619202931c1537a5cb2b365ec3b804f39d46", 0x69}, {&(0x7f0000002180)="4529e4ab4ab60e52e7bb12b996ad19f6089d48aae2ccc5bd6c7c28b3eaf8c4418cacd8378ec7ffd75c5b15e9d12b8a08412b3ee149d62835c3d7e932f9513f23a1fb899ac45b6c9c943dd22fca4aea80253327d744c2ffb611cacd65d5cfa0c33326c2c3ffa4a9c484b225a630cada3393555f6ef1bf8ab85c24d941ccd948a7", 0x80}, {&(0x7f0000002200)="a033aa762fa51ec6249ccca670da9057928fac822c7e0b90216fd23e42ab02c5cc7fbe89804aef52f4361301be51d2bbcca173f3caff35164520cbff5728de3fef3b590eed7840921552a0fa8c7d357345114a3ff7428b17854a804ac2a294f388401c8288dff384efa83609b9c454631d47ea0db737f1f4b805feba75085f830fa8d4a6d1adea8b33bb59", 0x8b}], 0xa, &(0x7f0000002380)=[@txtime={{0x18, 0x1, 0x3d, 0xffff}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @txtime={{0x18, 0x1, 0x3d, 0x1f}}, @txtime={{0x18, 0x1, 0x3d, 0x20}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x90}}, {{&(0x7f0000002440)=@xdp={0x2c, 0x6, r5, 0x3e}, 0x80, &(0x7f0000002500)=[{&(0x7f00000024c0)="288120927cedbc595a9c351d23da7dcb", 0x10}], 0x1, &(0x7f0000002540)=[@timestamping={{0x14, 0x1, 0x25, 0xfba}}, @txtime={{0x18, 0x1, 0x3d, 0x100000000}}, @mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x7fffffff}}], 0x78}}, {{&(0x7f00000025c0)=@sco={0x1f, {0xad2633e, 0x6, 0x5, 0x6, 0x1, 0x3ff}}, 0x80, &(0x7f0000002640), 0x0, &(0x7f0000002680)=[@timestamping={{0x14, 0x1, 0x25, 0x3eaf}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x60}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x7f}}, @mark={{0x14, 0x1, 0x24, 0x3f}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0xc0}}], 0x4, 0x10) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000002840)={0xa, 0x4, 0xfa00, {r3}}, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000001c0)={r6, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r4, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = socket$inet_smc(0x2b, 0x1, 0x0) userfaultfd(0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r1}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) getpriority(0x1, r3) [ 525.313052] audit: type=1400 audit(1564520770.680:241): avc: denied { setopt } for pid=22412 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 21:06:10 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80000) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f00000000c0)={0x400000000000000, 0x102000, 0xdd4, 0x0, 0x9}) r1 = getpgrp(0x0) ioprio_get$pid(0x0, r1) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000040)={0x6, 0x0, 0x2, {0x2, 0x800, 0x512, 0x40}}) 21:06:10 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file1\x00', 0x8, 0x2) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:11 executing program 0: r0 = gettid() r1 = getpgrp(r0) ioprio_get$pid(0x3, r1) 21:06:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000180)=0xfffffffffffffeb3) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e21, 0x2, @rand_addr="3b50880de4a5f0b24fde6429415690a5", 0x9}, 0x1c) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f00000003c0)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x20, @mcast1, 0x1}}, [0x36, 0x4, 0x5, 0x1, 0x5, 0x8, 0xfffffffffffffffe, 0x0, 0x1800000000, 0x71c, 0x9, 0xffffffff, 0x7fffffff, 0x0, 0x9166]}, &(0x7f0000000400)=0x100) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000007c0)={r2, @in={{0x2, 0x4e20, @rand_addr=0x3f47}}, 0x1, 0x4}, &(0x7f0000000440)=0x90) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="5f133030c9a6a443ca9c6c1290354c1310cc219f78f55f01af043cb209525241f3bd1c2dc5c166495ff48953bbb6c167c7bd41b97904d8812b0000000000", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000200)={0x4, 0x401, 0xfffffffffffffffe, 0x9, 0x1b, 0x3e, 0x8, 0x3f, 0x7fff, 0x2, 0x80000001}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x800, 0x400080) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x56}, &(0x7f0000000080)=0x8) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000140)={0x1, 0x1, 0x8000, 0x9, 0x73}, 0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x0, 0x80}, &(0x7f0000000100)=0x8) 21:06:11 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)=0x5c) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') sendmmsg(r1, &(0x7f0000000600)=[{{&(0x7f0000000280)=@generic={0x1d, "686e6ec2e6003b99fd2a8caab5c637d4084e8ea7530773923eba6c845f980bc945c5d17823df3ba7fd79a4756f8c48f4fa1b08e9febbdf22608a14516a4e03cef35a3d0aed10d1c0ac46810842839001814888d4dbd622292bbddd687e02176d5c6ad835125ebbfa1da46b0578d648406e79f4c4bf1358850b8319071c17"}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000440)="bde1884509a443e4a0087b944118e4a33d003259ef4e3e6fb6d3758d167394a8ed5064f6b3f2d5dcf67ece0eedc799223044985299fc97077400464ac89d3d4b9053b695a58406218a1aa0eb4f54240670fb8be5b27a9257ff7dde9e3806503df36e07b2e77602dec8fb34c24ec8337a6f1eed6d5d728320c9c05c69a67378ce6be084593f49080f95ed25b42cb652faa17e3f6b", 0x94}, {&(0x7f0000000500)="1d440366a446f08e2a771f4b2e401a3a527ccf3c8a62c3bb3900fc09fffda851c892919c9b827d720ea42023503402d9b0eb4eaffe6d4818f900b505c8d268abb19231c4a4237d6f05e22e770c3f4d063aa8af8adb601621a2bfad78cf87c6", 0x5f}, {&(0x7f0000000580)="4f957408336ea68419d932b85c7ba492e3b54759af7b81534f7e93900112c10cc46e69a0f7bdf52f75a939e3a4e079af", 0x30}, {&(0x7f0000000680)="2d2142d13707874e745c344e0e95f9b7d4bbe5296bae96107f5396c35fc0a38bb3831952fa8db51cb8fe85dcf2a82d12b12d6d886d2379fe93ca9ed6200a67d32750d331cfacdf4e84fda001ee4d68b16c1e034100c0fa9733a81ae2f220befa71dbbdabb9012ee08121e4e756724f0297a111fbe58ca43cc80873cbb1a3442b696c5db2b2df441f9c2b59f569bc9425c9584431f064a0b72dbb54cb39ee7fd8215c2f4d9442ea64f9c0871e01f9aab767dcb6dbdf01f19fc5fcf45667586898", 0xc0}, {&(0x7f00000005c0)="1658e9a2094afaba8a9a41bb", 0xc}], 0x5}}], 0x1, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) sendmmsg$unix(r1, &(0x7f0000001440)=[{&(0x7f0000000940)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000740), 0x0, &(0x7f00000009c0)=[@rights={{0x20, 0x1, 0x1, [r0, r1, r1, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r1, r1, r0, r0]}}], 0x48, 0x800}, {&(0x7f0000000bc0)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000c40)="a07c694dd23a54aa95977d46bbf9c18133a2924059da977fbc5b55790640348698129494cab08fe3386b8797af264eff7097d36588436e01f75d9f57bca781f7707157b65b5f724990417d32baa95121b9912c959e0922f19e7ee2eefdd3b450ddd2fd2ab0db1d8b9557264b9a2a9a2d189b29ae02d01c0b27add76ebad6585a1e6c155925193859", 0x88}, {&(0x7f0000000d00)="883b9c8435a318e323854c3659d6cb1d17dc60e897cf9ee6c81ec9fd6192571a07e132e079c8902dfe6cf45c1bbfe055cc53aded3b742cf2a7eb88144cc83477ee59ee62c04711d8216bdb2af8818d470e3e3bb9255c654a47c89ff8895c59e66d94f434c3c2b1c07897a7008195bef1ada9c26b25b31563c0d3bdefea53d7dd66e78aff2132da5f0d2d4bea233555c59f898c31c9088217ef75a8e82c797330115f2fabe21da991e82b8d0f4f86c4", 0xaf}, {&(0x7f0000000dc0)="0221dbb48c4fd1eb6435162e0a0fccc44415a4716e052155327f7cb16468ce05ec79fd0008152a369ff76f5a4fea00f23ed3744a7505a64593ce3e4a90c8010946e49c5bf91d4b92e9278e5b2945787fb6bbe4ff5b351dccf1cbdb9ef9661be6ed4e637ac3b40e7d7bb6f2eefc95765c0d514c3787cba11ce903ebe16a7977362ec622642c8aee858af555c6774731832f8dee2d13f2ef9b41ef6db560e1e8fb70474c63515cd2dbf6756bb3d5ae6ef6", 0xb0}, {&(0x7f0000000e80)="0e7c324cb29895b521e6c709a9ec9975bcbe4503e964b6e16819f9a59a2f30cf45f2563a42efc17f3ec3c2c6e7795b05b9053f008e76439c092d725d99026fc78c8aef31b8af6fcd0ab4997ec109182aea39c59456c96d87", 0x58}], 0x4, &(0x7f0000000f00)=[@rights={{0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}}], 0x28, 0x4}, {&(0x7f0000000f40)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000013c0)=[{&(0x7f0000000fc0)="87df0ad056d47606a9d2277828584554332e5fa58e00eb1eecfa80022000ad2b565611907d3f3a5c1d1c2b21c5370f08f4a65853189f6c5471d1eb9249105d2f1f35b27c7c3a75984308b614a1d15bdfbe8eda8cbea2961c039ee50208dc89ac5b426c1808d49bbd6a65e9", 0x6b}, {&(0x7f0000001040)="a6eb644675e21f12504c37d1ed8acfdf70d1f6f4455015b0fa270d3beda93c89666105eabdb1f7458076c2bee54d53876aa4fc389942c3573c89b3b6b11cb44a39a2169126abdcb96fc429513cb0985227cc2dd7d1b7d0b038cb26f0212e73f6cddadcaab25c3b564b0345d8339c228eace9b912332008a3fc9c7b30041d30", 0x7f}, {&(0x7f00000010c0)="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", 0xfe}, {&(0x7f00000011c0)="104d7610c9223b5f3df6eb968ba24a04d081766066e2d63fdc37683720c01c0120e83b6e87b9044dc07982313817f31bd9ad1effcbed0b83be29005fb1ede26e2eceb45c526869b75ea064b513ecc6f85633d4109f12d01b6ca9b2f77bebd5a45a7ad55b12c3d9766d4d130496880d88aff432cc8651229250843218a0daa0e53981686d62051decc64b376565f017df1920dd794330cd56e1f245071adcd7c6066c6d92c92a7610345e915af6504bdd0b3f139cb0b2dfe4489a54f533e26b58681c98e5d3099fe4d20cf845078dd1da240730091f702f57d3b2242c", 0xdc}, {&(0x7f00000012c0)="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", 0xfb}], 0x5, 0x0, 0x0, 0x805}], 0x3, 0x4) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:11 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:11 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) 21:06:11 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) r0 = getpgid(0x0) r1 = getpgrp(r0) ioprio_get$pid(0x3, r1) 21:06:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0xba, "d162a3dee23227e8a18b904afcd4e749a69e457daed46dc7bf1efcdcc9f109fc11da21d119e07c790a27aa9d287b0bcb7a1092fab9ac82587071d7c0b0dd696946cf7a1d20b9aadc774674c4bda7a12b0281e8af4bec0f94fd35fe328cd154027956505f4b754b9e5f95602806eced0bd11fbf423b3257f426276cb5396461f84f4ff25dbec38e95939a06b9a45ab30e4afd86bd1e59ed71129bd00e79f1b320f9ec0b1c8dd00cd98ac0082c3ef8db9d257e62472a6df4e8815c"}, &(0x7f0000000100)=0xc2) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x1}, &(0x7f0000000180)=0x8) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) 21:06:11 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xa33d) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:11 executing program 0: getpgrp(0xffffffffffffffff) getpgid(0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(r0) ioprio_get$pid(0x1, r1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x208, r3, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x32}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa2c7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb09b}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x30}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffffffad}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000000}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x40000}, 0x24048801) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000000)={0x705, 0x7, 0x4}) 21:06:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000540)={'filter\x00'}, &(0x7f0000000440)=0xfffffdf3) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000640)='./file2\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="1e09b8863cbdf21cc5876dded255347588d94a29574ad274eb75e5e3ec55323dc0415e24c38cb877eac4f0ad869e99f0fbe10f4fbd313607a14e15b2d93a247069411680f335e323e327084a88302a2dbcb26ff0efa278d7be82", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) renameat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000400)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x300, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8080, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000040)={{0x3, 0x2, 0x4, 0x0, 0x800}, 0x0, 0x1000, 'id1\x00', 'timer0\x00', 0x0, 0x80000001, 0x5, 0x8, 0x774f}) 21:06:12 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) r2 = open(&(0x7f0000000280)='./file0\x00', 0x414000, 0x4) write$FUSE_WRITE(r2, &(0x7f00000002c0)={0x18, 0x0, 0x6, {0x47ef}}, 0x18) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000180)='./file0\x00', 0x189) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e23, @loopback}}, 0x0, 0x4b, 0x0, "6e0c6ee9bf9a5df58646836ee0e5968c8a60b77c7c85fed07c204078fcc2ad4ec35d4dccc8803b80fc41921bed7d60b7b659539d8d8b86e4761614c6c6158b85ffbc0e1676460af7e9db26e64bfd243b"}, 0xd8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:12 executing program 0: gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x3, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x21, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x65) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x2f) r2 = getpgrp(r0) ioprio_get$pid(0x3, r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0x1) 21:06:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x101000, 0x0) 21:06:12 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000180)={0xc9a, 0x0, 0x0, 0x5e7eb908}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000200)={0xbb9, r1, 0x0, 0x9}) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x12001, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x1, &(0x7f00000000c0)=0x2) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080)=0x7, 0x1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) 21:06:12 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = getpgrp(0x0) write$P9_RLERROR(r0, &(0x7f00000001c0)={0xd, 0x7, 0x2, {0x4, 'nr0\x00'}}, 0xd) ioprio_get$pid(0x3, r1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100002}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0xc, 0x13, @l2={'eth', 0x3a, 'nr0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x800) 21:06:12 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) connect$can_bcm(r0, &(0x7f0000000280), 0x261) 21:06:12 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:12 executing program 0: r0 = getpgrp(0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x216800, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000000c0)=""/127, &(0x7f0000000140)=0x7f) getsockname$packet(r1, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000011c0)=0x14) sendto$packet(r1, &(0x7f0000000180)="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", 0x1000, 0x40004, &(0x7f0000001200)={0x11, 0xf7, r2, 0x1, 0x1000, 0x6, @random="eefae91cc3c1"}, 0x14) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000001240)={0x4, 0xfffffffffffff42e}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x60300, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000040)={0x20, 0x0, 0x4, {0x0, 0x2}}, 0x20) write$cgroup_subtree(r3, &(0x7f0000001280)={[{0x2d, 'pids'}, {0x2d, 'memory'}, {0x2d, 'cpu'}, {0x2b, 'rdma'}]}, 0x19) ioprio_get$pid(0x2, r0) 21:06:12 executing program 4: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc3;+\xf1\f\xc4\fe'}, &(0x7f00000000c0)=0x1e) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000040)) 21:06:12 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x80000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x420082}, 0xc, &(0x7f0000000400)={&(0x7f0000000980)={0x2c0, r1, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xe4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbdf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2000000000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbc66}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x9c7}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x79dacafd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'gre0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4c}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ptmx\x00', 0x801fc, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000540)) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x2000000, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0xffffff5f) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="c79955fcf2c9a2db1e621cbe98374ddec7ff613e92b8de38b410fde1ae9c9e69fe298b994a82e895f99d9ef20753036928bc1d322683948de5ac6e68fc17e2a237d311c054be589a11f8085b42dd5579af0a48f3e8b08d99a2139fb59684f7", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000340)={0x40, 0x0, 0x7fffffff, 0x20, 0x3, @discrete={0x8000}}) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:12 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000280)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:12 executing program 0: getpgrp(0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$sock_proto_private(r0, 0x89e9, &(0x7f0000000240)="69772c784097e2410e1ece002a84c0f63bdc5567144087764ca7cec30b4a7eea50b1d2f72011fedbdf9e0b8b022d79df5b93bc182cd5661092f46452d89476cd0f8de190b1d8475247f04d5b86ef3084b90f702e4c30c090180841a7578028ea9aa9497c75b8ba464e7a6a97e415a0b52b8f6b04256f8c9c8fddc22b3f6828d055a065007db6f4c5dc20e4f45051f93f4db30073a7e94c850ef7104abcaabb64c208bd16cb581e") getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) r2 = getpgrp(r1) r3 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000040)={0xc12, 0x6, 0x7, 0xc78, 0x5, 0x4}) ioprio_get$pid(0x3, r2) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x4000) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x31) 21:06:12 executing program 4: getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) [ 528.071034] net_ratelimit: 14 callbacks suppressed [ 528.071057] protocol 88fb is buggy, dev hsr_slave_0 [ 528.081476] protocol 88fb is buggy, dev hsr_slave_1 21:06:13 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) close(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:13 executing program 4: r0 = fanotify_init(0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) 21:06:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000180)=0x9aa) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(r0, 0x402c542b, 0x0) 21:06:13 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:13 executing program 0: gettid() r0 = getpgrp(0x0) ioprio_get$pid(0x3, r0) 21:06:13 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:13 executing program 0: r0 = getpgrp(0x0) ioprio_get$pid(0x3, r0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0xcf) accept4(r1, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x80000) 21:06:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000280)=0x1e) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @rand_addr=0xb}, {0x7, @dev={[], 0xe}}, 0x8, {0x2, 0xe0, @local}, 'rose0\x00'}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x6080, 0x0) r3 = gettid() getpgrp(r3) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000080)={0x11, 0x6, 0x1f, @link_local, 'nlmon0\x00'}) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000040)=0x1, 0x4) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='tunl0\x00'}) 21:06:13 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f00000002c0)={0x0, 0x7}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x16001, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000080)=""/122) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) [ 528.480530] protocol 88fb is buggy, dev hsr_slave_0 [ 528.486108] protocol 88fb is buggy, dev hsr_slave_1 21:06:13 executing program 0: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = getpgrp(r1) ioprio_get$pid(0x3, r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) clock_gettime(0x3, &(0x7f0000000200)={0x0, 0x0}) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r7, 0x8935, &(0x7f0000000180)={'syzkaller1\x00'}) ioctl$NBD_DO_IT(r7, 0xab03) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000100)={0x7, 0x0, 0x4, 0x0, {r5, r6/1000+30000}, {0x0, 0x1, 0xd4ce, 0x9, 0x9, 0x5, "11e7c675"}, 0x0, 0x4, @fd=r7, 0x4}) [ 528.550612] protocol 88fb is buggy, dev hsr_slave_0 [ 528.556523] protocol 88fb is buggy, dev hsr_slave_1 21:06:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) [ 529.190743] protocol 88fb is buggy, dev hsr_slave_0 [ 529.196087] protocol 88fb is buggy, dev hsr_slave_1 21:06:14 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)='nodev-+\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) r0 = gettid() r1 = getpgrp(r0) ioprio_get$pid(0x4, r1) 21:06:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000540)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="c5e79d3627fe4cc61be6d41be6b3e11a80710ccbe6cc82d42912b57becff7e6746fd7297ad62a7d164167978ba81a7c907a39a5a62c5a873979ccc70ffeaac1b4a020221eee2fd3fe6d433c238d8fe0f156ebd4e7ce5dfaf1e7ddafd0de4378c4d7427c75c22340cfbbc593311e8723f82c2577afbe02fd82854822f095a022d243e57f742f9d4dace41bca1ff6b93925408ba7414c9c405e7057a3d65d8032efb75987930bbba737b4b34319689f2520f32292284b666fd0662afb93dbdce2a2608a41d99", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/user\x00', 0x2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:14 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) socket$nl_xfrm(0x10, 0x3, 0x6) socket$netlink(0x10, 0x3, 0xd) r0 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x100000000, 0x6400) socket$tipc(0x1e, 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x6e) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000600)='./file0\x00', r2, &(0x7f0000000680)='./file0\x00') poll(0x0, 0x0, 0xffffffff) bind$rxrpc(r2, &(0x7f0000000280)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0x8, @mcast2, 0x8}}, 0x24) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000540)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000005c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000500), r3}}, 0x18) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x7ff, 0x4) 21:06:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000040)={0xe35, 0xfffffffffffffff8, 0x2, 0x2, 0xc, 0x7fffffff}) 21:06:14 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:14 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000087c0)={0x0, 0x0, &(0x7f0000008780)={&(0x7f00000086c0)=@newlink={0x34, 0x10, 0x505, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @erspan={{0x10, 0x1, 'erspan\x00'}, {0x4}}}]}, 0x34}}, 0x0) r1 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @default}, [@default, @null, @null, @null, @remote, @null, @netrom]}, &(0x7f0000000380)=0x48, 0x80800) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)=0x0) r3 = getpgrp(r2) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r4, 0x40305652, &(0x7f0000000040)={0x1, 0x4, 0x4, 0x5, 0x2, 0x5, 0xd8}) ioprio_get$pid(0x3, r3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x5, 0x2}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0xd, 0x1, 0x1000}, &(0x7f0000000180)=0x10000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x8}}, 0x10) ioctl$DRM_IOCTL_ADD_MAP(r4, 0xc0286415, &(0x7f0000000080)={0x0, 0x4, 0x3, 0xc5, &(0x7f0000ffd000/0x1000)=nil}) 21:06:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:06:15 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) [ 529.590646] protocol 88fb is buggy, dev hsr_slave_0 [ 529.596271] protocol 88fb is buggy, dev hsr_slave_1 21:06:15 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = getpgrp(r0) ioprio_get$pid(0x3, r1) 21:06:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000100)='vlan0\x00') getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) 21:06:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) getxattr(&(0x7f0000000180)='./file1\x00', &(0x7f0000000200)=@known='user.syz\x00', &(0x7f0000000340)=""/126, 0x7e) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(r0, 0x402c542b, 0x0) 21:06:15 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = getpgrp(r0) ioprio_get$pid(0x3, r1) 21:06:15 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x5, 0x2, 0x1f, 0x7f, 'syz1\x00', 0xcb}, 0x1, 0x31, 0x1, r1, 0x3, 0x7, 'syz0\x00', &(0x7f0000000280)=['em1$em0cgroupkeyringuserposix_acl_access-\x00', '*\\ppp1\x00', ',posix_acl_access]cgroupwlan0*-\\\x00'], 0x52, [], [0x1f, 0x101, 0x6, 0x76]}) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:15 executing program 0: r0 = getpgrp(0x0) rt_tgsigqueueinfo(r0, r0, 0x19, &(0x7f0000000080)={0xe, 0x36, 0x400}) ioprio_get$pid(0x3, r0) rmdir(&(0x7f0000000000)='./file0\x00') 21:06:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:15 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:15 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x6, 0x70, 0x2, 0xffff, 0x3, 0x5, 0x0, 0x100000000, 0x2, 0x2, 0x7, 0x9ad, 0x9, 0xd9d, 0x40, 0x7fff, 0x0, 0x5, 0x1, 0x6, 0x1f, 0x2, 0x8, 0x9, 0x1, 0x4, 0x7, 0x3, 0x2, 0x10001, 0x0, 0x1, 0x9, 0x6, 0x5, 0x6, 0x9, 0x6, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000280), 0x4}, 0x8000, 0x5, 0x2, 0x7, 0x5, 0x2, 0x1ff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x1, 0x0) r3 = userfaultfd(0x800) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/mls\x00', 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file1\x00', 0x0, 0x18}, 0x10) ppoll(&(0x7f00000005c0)=[{r0, 0x180}, {r1, 0x4}, {r2, 0x40}, {r3, 0x4000}, {r4, 0x100}, {r5}], 0x6, &(0x7f0000000600)={0x77359400}, &(0x7f0000000680)={0x2}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f00000006c0)={0x0, 0x101, 0x4, 0x101}, &(0x7f0000000700)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000740)={0x4, 0x3f, 0x8, 0x6, 0x401, 0x800, 0x7ff, 0x6, r7}, 0x20) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) setrlimit(0x5, &(0x7f00000000c0)={0x3, 0x1f}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f00000001c0)={r8, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r6, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x202000) ioctl$UI_DEV_DESTROY(r1, 0x5502) 21:06:15 executing program 0: r0 = getpgrp(0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001e0001002bbd7000fcdbdf25d6070000007827e42e51101c2ba867f2000004d5ec086a36ec6f4a020a003e000000000000000000000000000000000101000000063500000800040003310000273f1fdf1b81f726b66ac0c2b7be843208d3723faac17d95087ec5181af4c95555e40b0a316b6d7b793539b044ec3f7873964b57"], 0x48}, 0x1, 0x0, 0x0, 0x200000c0}, 0x80) ioprio_get$pid(0x3, r0) setsockopt$inet6_int(r1, 0x29, 0x8, &(0x7f0000000000)=0x100, 0x4) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000340)={@remote, @mcast2, @ipv4={[], [], @loopback}, 0x4000000000000000, 0x2, 0x9, 0x100, 0x1000, 0x203, r2}) 21:06:15 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000200)={'TPROXY\x00'}, &(0x7f0000000300)=0x1e) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000180)={0x6, 0x7ff}) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icm\x00\x00\x00\x00\x00\xff\x00\t\x00\x00\x00\x001\xd2\x00\xfe\xff\xff\xff\xff\xff\xff\xff\x00'}, &(0x7f0000000500)=0xd) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000003c0)={{0xa, 0x4e21, 0xffffffffffffff81, @remote, 0x1f}, {0xa, 0x4e23, 0xb7ed, @mcast1, 0x3}, 0x4, [0x60, 0x5, 0x81, 0xfffffffffffffffa, 0x3ff, 0x6, 0x13df2578, 0x80]}, 0x5c) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x500, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000380)={{0xfffffffffffffffb, 0xffffffff, 0x3, 0x40, 0x7, 0x8}, 0x5f, 0x4, 0x81}) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="1f0027bd7000fddbdf25e9c289397ea74d710c00040009000000000000d4c1590609b5000800020007000000d98690ba502d88bc2fd589c58368b4ee0d718b3d9807d96eb53eb3924f974a83d1c35b8bae530d0a6d9131cfc94ca4cf42635d9469b297d5cd52549df3a94f929bb4454f5579b42fc985f85b18d054642157bca0fceb8990f0d4819089012184482f3c4f0ef93d9202c71d868b327accf43977c09ee0c19357"], 0x2c}}, 0x80) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xcc, r2, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe7fb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x586}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x4}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 21:06:16 executing program 0: r0 = getpgrp(0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioprio_get$pid(0x3, r0) 21:06:16 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0xfff, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x2, 0x3, 0xfffffffffffffffd, 0x7, 0xc2}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000008c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f00000002c0)=0xfb) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) socket$inet(0x2, 0xb, 0x9) 21:06:16 executing program 0: r0 = getpgrp(0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x9, 0x0, 0x6000, 0x8, 0x1, 0x2, 0x800, 0xffff, 0x1, 0x200}, 0x10) ioprio_get$pid(0x2000003, r0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x800001, 0x205) setsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f00000000c0)="a66b9088a55e34b2e5882ea9dea16f4bad64f510ccdc54415907aa0177ccb98c21cad37bd4899daa85268e27c437bf63c7d5eaf1f584627fcc5ab03fb5e881f620482880811af99f13cd7cf2512716d7e4fc005541f1a2b477697df37717ff3081edaec1f6b09344afc1e3bafa449901dc0c47630105f336abfc93e8c4dc388cb61d1fb075743287512a642b84271db8c65344f8160a6dc0491d659fab4a1d9de540d687fbeae8bb18150c2019bcaedeb5f3cccc56433e93a3a780c3698f7d08d1825751a610909553", 0xc9) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000080)=0x8e) 21:06:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000180)={'caif0\x00', 0xffffffffffffffff}) pivot_root(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="4ec7de0132e85a56bbd481152e87dcd9c5653495005bf3fb983cca387c27278623013af354c4aa702d4370df2ef53de0d20ac4ddfbeab89339bc383b8b0661ac0a9900edd6c58511ca647e1798cc4eaa0117a7702fb61ff70c6055f3ceb24a88bfac97158c6b3ee0805381390af087bd5366b7d70d16308ccc73415ff87d26388aacac91", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt(r0, 0x80000000, 0x6, &(0x7f0000000100)=""/59, &(0x7f0000000200)=0x3b) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000040)={0x7fff, 0xffffffff, 0x7, 0x8, 0x7cd7, 0x7}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x200}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x7f70, 0x8000, 0x3ff, 0xfffffffffffff801, r2}, &(0x7f0000000180)=0x10) 21:06:16 executing program 0: getpgid(0xffffffffffffffff) gettid() fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x120, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x9c04f192bb79661c}, 0x8000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r3 = getpgrp(r2) ioprio_get$pid(0x3, r3) 21:06:16 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0x68) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000002c0)={0x4, &(0x7f0000000280)=[{0x1, 0x1000, 0x7, 0x2}, {0x4, 0x80, 0x7fffffff, 0xab}, {0x3, 0xae07, 0x2, 0x6}, {0x0, 0x8, 0x3, 0x9}]}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000001c0)=0x4) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100), &(0x7f0000000140)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000380)='./file1\x00', 0x4) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0xaf) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:16 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:16 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:17 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ptrace$getenv(0x4201, r0, 0x6, &(0x7f0000000080)) r1 = getpgrp(0x0) ioprio_get$pid(0x3, r1) 21:06:17 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) accept$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2002, 0x0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000040)={0xa, 0xa, 0x7, 0x40}, 0xa) 21:06:17 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:17 executing program 0: r0 = fanotify_init(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfe47bf070") fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 21:06:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x2800) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000040)={0x8, "95010db80587c1f2327fd4581a64732a8d7f1cc82d3f5ec877e924c269b766cc", 0x190, 0xd729, 0x2, 0x0, 0x4}) 21:06:17 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x810000031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000100)) 21:06:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="a26bb61519b523ab0e2b2321ffeb122946ab27d0a7ba07e55c23f591193124b40cd180c437f8458f066124fc56dd27b300db281e4e990437676829266310813286e910003907358072b778fb6a96fda545948049684235899d8cf4d5eaa13b50af4aa6ef3c6c782ff8a540df477260b9fec947314667bb398ffc83d669c8a3f084691206a7f20733d44333cbccc9122c22c4a8c121034ba595a0", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x3, 0x0, 0x0, 0x0, 0xfb}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xc8000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=@security={'security\x00', 0xe, 0x4, 0x418, 0x138, 0x138, 0x138, 0x0, 0x138, 0x348, 0x348, 0x348, 0x348, 0x348, 0x4, &(0x7f00000003c0), {[{{@uncond, 0x0, 0xf8, 0x138, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x2c, 0x800d, 0xfffffffffffffff8, 0x3, 0xffffffff00000001, 0x200, 0x2010}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x7, 0xc, "5fa63296f68f1107582d164104e8d3a2c8d9591be31d49054e10b68dd241"}}}, {{@uncond, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, 'ip6_vti0\x00', 0x3}}}, {{@ipv6={@mcast2, @loopback, [0xffffffff, 0xffffff00, 0xffffff00, 0xff0000ff], [0x0, 0xffffffff, 0xff000000, 0xff000000], 'tunl0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x87, 0x69, 0x4, 0x8}, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x8, 0x3, 0xfa1}, {0x200, 0x80000000, 0x18a}, {0x400000000, 0x3}, 0x0, 0xff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x478) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x208, r3, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x100, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbbc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xefb6}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000380)={0x1, 0xf000, 0x28, 0x57558b7, 0x5}) ptrace$getregset(0x4204, r1, 0x203, &(0x7f0000000400)={&(0x7f00000009c0)=""/194, 0xc2}) 21:06:17 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) sendto$inet6(r0, &(0x7f0000000540)="38af78baa539cc45b501db5f6c8e409c32036330551fb5d1f3890eb26355d202a3ed1ff611e5cc5e5e00ded54cbadda2800349cc27e4e4ce3053a565b3e6fa363ff518b523f72e79374cc49a6966fbf5c2e51d9697361871c2480a01a532a9ab76371e791c8965a197173e87a34ce7ae5eab24496131d8cac671afea622e06ea30acd9b6919b5a1acdd79569cfca5b68d55f95a069513eeaef117f437d49ebb64bb1bb5e97c600a9a5d445de117ceaba420a67fe4e6ce0656982d8717e414c26f11251ddb0731e5e1149a6719bc949f2f4218584e27f56b33ce70ec2fc2069ac719c37da1a33f2", 0xe7, 0x80, &(0x7f0000000280)={0xa, 0x4e23, 0x5, @rand_addr="3cb55f8419ae7629312bebdec00f9277", 0xfffffffffffffffc}, 0x1c) 21:06:17 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:17 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0)=[{0x0}], 0x1}, 0x40) writev(r1, &(0x7f00000000c0), 0x20000000000002dd) 21:06:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@ng={0x4, 0x1, "eb297cf329441288df"}, 0xb, 0x1) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:17 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000440)='sysfs\x00', 0x9822, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000004c0)={r1, 0x1}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000002c0)={0x4, &(0x7f0000000280)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000440)={r3, 0x22}) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="d689b8c5a7399dcaa1ee471e1dd3639c67fb52bce88ec135f95bc6af3180a80869bd8e70746cb78c8525374931eb5d71096c8f2dc7f97448d244cc137c5d700b3526cf38304cf52d540243225f62c27e429477bdd8ab961d61d1a63976e7655ec89ae5f05289b351629c1c7f9e71e6d28787557d3dbb53866592d99bb5d851901819d700294bb8db90be10facd941349ac95c8b634f451a157837a7e06fefa67fd6c32966ac2068de751d80e13bb25fbfdcf8a7fe7eed70a8be1e5564b41a86e923c9f45ee9fc2e34a199e8f5b6acf979b", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000200)={r2, 0x80000, r1}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:18 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x40140, 0x0) sendto$unix(r0, &(0x7f0000000440)="27ea5339a8bb9d6ed6f689e0ff0537a5e7f4f8dac4160c1964a386409f886a75d8eb3dc617c0acd88af3cf79cb70e2926676ff02485ad409f49fccc86ea76bed2779b0f2b72c86abaa37", 0x4a, 0x40000, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) [ 533.360629] net_ratelimit: 16 callbacks suppressed [ 533.360643] protocol 88fb is buggy, dev hsr_slave_0 [ 533.371115] protocol 88fb is buggy, dev hsr_slave_1 [ 533.750160] protocol 88fb is buggy, dev hsr_slave_0 [ 533.755253] protocol 88fb is buggy, dev hsr_slave_1 [ 534.310175] protocol 88fb is buggy, dev hsr_slave_0 [ 534.315296] protocol 88fb is buggy, dev hsr_slave_1 [ 534.710141] protocol 88fb is buggy, dev hsr_slave_0 [ 534.715240] protocol 88fb is buggy, dev hsr_slave_1 [ 534.790131] protocol 88fb is buggy, dev hsr_slave_0 [ 534.795211] protocol 88fb is buggy, dev hsr_slave_1 21:06:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40002, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r2 = socket$inet6(0xa, 0x6, 0x100) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r1, 0x100}, {r2, 0x1}, {r0, 0x620}, {r2, 0x280}, {r2, 0x8020}, {r0, 0x400}, {r1, 0x4}], 0x7, &(0x7f0000000100)={r3, r4+30000000}, &(0x7f0000000140), 0x8) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r5, 0x210, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 21:06:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) getsockopt(r0, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="4501b2fb8aeb3580400bdd8f0a028e4275e5a1a6370d636bb7e7759737e56ffc8502ac2f8f10567b8003e85328ed8ed15aae8fa9c4390ae2f64eef6989d7e82360e9a710f9b94ed6b90fae5394c4b6db465b41932bcc82cedcea4292b285c8942dd002519dd84ae024bd40129e37659606eb3f7fcadfa567db3297b7906c369357489ea9cc9069a6454b1b18e14c8dc517b655423be28001cde74489ac3883e6692cddc46a0021c364d9a3c990b6bab6bc251bc195d04d91992d4d02a0ae00"/200, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f0000000340)={0x0, 0x0, 0x6, [], &(0x7f0000000200)=0x10000}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000003c0)={[{0x401, 0x8, 0x41b6fdf6, 0xffff, 0x8001, 0x7, 0xa2, 0x8000, 0x200, 0xff, 0x2, 0xffff, 0x2}, {0x7, 0x8, 0x225, 0x3ff, 0x7f, 0x4, 0x800, 0x1, 0x7, 0x8, 0x1, 0x6, 0x3}, {0x8, 0x1, 0x0, 0x1, 0x4, 0x80000001, 0x7, 0xb9, 0x3, 0x8, 0xf186, 0x8000, 0x2}], 0x401}) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x0, 0x100000000, 0xfffffffffffff8ea}}, 0x30) 21:06:20 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x20}, &(0x7f0000000240)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000440)={{0xe6, 0x3}, 'port1\x00', 0x80, 0x10, 0x6, 0x5, 0xffffffff, 0x8, 0x6, 0x0, 0x2, 0x3}) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:20 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:20 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000040)=0x3, 0x4) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) sendfile(r2, r0, 0x0, 0x5e8bc007) 21:06:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) syz_init_net_socket$ax25(0x3, 0x3, 0xc4) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="ec4359ccdfc9f076126ec10e32056aee2bcfbd2924cb9d244b657048458c3849c2f7", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:21 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x27) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'iMmp\x00\x00\x00\b\t\xef\xa8\x00@\b\x00\x00\x00\x1f\x00'}, &(0x7f0000000500)=0xf) 21:06:21 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=@gettfilter={0x54, 0x2e, 0x400, 0x70bd25, 0x25dfdbfc, {0x0, r1, {0x3, 0xc}, {0xb, 0x1a}, {0xe}}, [{0x8, 0xb, 0x2}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000011}, 0x4) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000180)={0x2d, 0x4, 0x0, {0x2, 0x101, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x14) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x3, 0x1, 0x200, 0x800, 0x53dc, 0x9, 0x2cc, 0x5, 0x0}, &(0x7f0000000340)=0x20) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000380)={r2, 0x2}, 0x8) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:21 executing program 4: r0 = socket$inet(0x10, 0x2, 0xa) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000b7839060c6d6681f53ef5167fe7cef903d2600000107031dfffd946fa283002030", 0x24}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) [ 535.792352] audit: type=1400 audit(1564520781.170:242): avc: denied { write } for pid=22951 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 21:06:21 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:22 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000009c0)={0x298, r1, 0xf02, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @mcast2, 0x3}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0xd0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1ca}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf176}]}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x891}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe17}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd3bb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb7f9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}]}, 0x298}, 0x1, 0x0, 0x0, 0x814}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000980)=ANY=[@ANYRESHEX=r2, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000540)={r4, @loopback, @local}, 0xc) 21:06:22 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000000)="b925912e4f19910c6f910283923de7c9c0f969f4c1d75b1c43c07f175e635a591a7757282118ed5d24bd7de8538ce0d09a2724a2d3a56131a8dab6e15a74f152ba84d69bb0a42c3e380f2172739b1aa1a795395a8d51203cc7b2ae7d27a6f94041ca6346e7ee9ce9b78eddf57ed669e747c829b56f8f584c46ee3a6baeb7e9d59873b179a4cf8957dce64c37", 0x8c, 0x4c050, &(0x7f00000000c0)={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x26}, 0xffffffff}, 0x1c) 21:06:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000180)={0x5, 0x1, 0x5d, 0x8, 0x3, 0x80}) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000040)={0x20, 0x6c, "1e99a910a10a4381b3cd963038e717bba7242e7ed5f79b495d2167bfc84f4e226f5cdfb4e63dbc7d03d07406c57daf7ed0dad4f45d8bcc767d6f522f7fa0d1d71579f5350483ae4219ebc0a76fcb91dc41571b204d8f4dc86acc37c281fafe89b9a86763b14c37c7c5d3e2d8"}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000004c0)={'icmp\x00'}, &(0x7f0000000500)=0x1e) 21:06:22 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x240000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xfffdffff00000001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x0, 0x0, 0x2, 0x3}, 0x20) 21:06:22 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x10800, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) linkat(r0, &(0x7f0000000480)='./file0\x00', r1, &(0x7f0000000500)='./file2\x00', 0x400) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x88) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000280)=""/66) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:22 executing program 4: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000180)="e557141ab9608f6fa268c5a2519d93be95819ce26b1f6ade83a64c255cf63fdac17acaabe5a9d14a8745af36880dad8136b4e817803fbdfea32425881f98a84f9b572b2c3fd92e59", 0x48, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 21:06:23 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4080080ffc, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000280)={0x7ff}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x6, 0x100003, 0x2, 0x401, 0x8, 0xc61, 0x7ff, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:23 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000200)=0x44) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000640), &(0x7f0000000a00)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xf) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pwritev(r0, &(0x7f0000000980)=[{&(0x7f00000006c0)="590edde51fef2d06cab6d2348393014d90b33e8e9a32b1d22ac768127c5d6b2877177b1fa92afd1475eb61675c3ddb8d09d2b9559f466c95c4daa643385b42ceff59de08fa28bbd45549daa4544c0f253afda32e43c65e330d042cb9202a664d45094858976491307a8fa7010a0b98b8fbee0b501a36c8de44da99b83e4c0cdadd1f5eeaf5e9a9089fe83029379f62db9f294b9affe0bfbe75a8a9828fdc6693b3d108a60a5f", 0xa6}, {&(0x7f0000000400)="f1da0679a172c67be73b52eb753c7b4b6d9e770c1b670afef9c9be9f176adfdf51463f7f1a66f46cb4a2425dd99eda6d349f3107956ef5eb9cf01912ba73a4d2607494e6c554b9d787b84190d74579fb9f05e25039c3c4bc5d30e1d1aae2268a8c2086c209c2c363c5ca6481bf2e62d0", 0x70}, {&(0x7f0000000540)="d88c171722f837eff26b8bd0ffcdb5eb1661e953be7e0fe11c39a341128e8df50cfcb6d27acc17e009cd4ec6991e059f1493b058a9bce7bed29b6ab439f3d8c08bf7aa", 0x43}, {&(0x7f0000000780)="ebc4f0392e99f3f10e682801e38de57c22af1a5459d4c7c8e124ec18c99bcbf5ff5e323381dc123ab958d84613a84a48ab48df6ed9c34725c5b7370f8086b7f16a9b34721346b222e81f4109aa6cce700aa413f4be4148e09eaa994eeaa63397195facacc70eb6935916", 0x6a}, {&(0x7f0000000180)="85deae4d8412d7a0c4cbdccaeeb3e9d98105ce1ceca9cc93c07a26d23d79d987d89681572e0fea36c512420021798377a1738831dc4c8ea8978734cb", 0x3c}, {&(0x7f0000000800)="2e590c534cb195381ea66045f5aca7e249fc532d059a5164ed9d6e0230812e7d7bb5e6827b9e8556859f68740d87bb40807cb9e8d529bbaf9ffa44032f343b72c91946babc9a85355cfdb81ba90821783a096787a107aeffa1356a0b285c538c443bd083f885f6a20c59615b038ac6942a", 0x71}, {&(0x7f0000000880)="9bccd91769cebf292f3e62c8a6d36d854a9ea59fc945b7b87ef2b31a1512022850a6719b422f0c22ca1a044634ba835b20ad6193a5214adfdc0949a857f07617c8a108a52439d1efe1a8b53207e6953fe83395748a0be94f4c9863e5981aa43d98", 0x61}], 0x7, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB="97361966c1bcf44297e34d514b1434f6debe2007c79c6f758ce9f579ef193f86dd8726d7e024dc5240509a723386f4ac4075bf79df", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xf) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r3, 0x0, 0xa, &(0x7f00000001c0)='/dev/ptmx\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r1, 0x5, &(0x7f0000000380)={0x1, 0x0, 0x8, 0x81, r4}) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) ftruncate(r1, 0x800) 21:06:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb}]}}}]}, 0x3c}}, 0x0) 21:06:23 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) [ 537.996754] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) 21:06:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000180)={0x34, 0x6, 0x0, {0x4, 0x6, 0xb, 0x0, 'bdev!(wlan0'}}, 0x34) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:23 executing program 4: 21:06:23 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:23 executing program 4: 21:06:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000700)=0x6, 0x4) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="59f8fb09f34c0ff95703712a650101289a9949e67f6dfe378677779b8e45675be689d8a16b12e33c9dce31eb23c7dc62725a6b4e00e96ba366330773eaf082720b26164619ecb0e7e8d9b442b8067d587b5c4c1e3c3a189a209f8566546bf3656264bd5893866373bfcfeae72241dc507c23e5e35512af6479256f2011e7902d98125948040b2c363d6c98c7e3f66279ec01b314cec07fcdd3db949e1b6717519d46a3a824de778ee2624f8678b0477e276672b33d100d9c7d6b15ec9d8ee0ae3d2a5143eb6cc54c3babb4433a554d68e0875597e3c8ad92", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) accept4$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x400000) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xd0}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=@gettfilter={0x44, 0x2e, 0x3, 0x70bd2b, 0x25dfdbff, {0x0, r1, {0x16, 0xfff2}, {0x0, 0xf}, {0x3, 0xf}}, [{0x8, 0xb, 0x101}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x10001}, {0x8, 0xb, 0x80000001}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$tun(r0, &(0x7f0000000740)={@val={0x0, 0x6005}, @val={0x2, 0x1, 0x7, 0xff, 0xffffffff, 0xe88}, @eth={@random="0865a1fb5f31", @broadcast, [{[{0x9100, 0x1, 0xffffffff, 0x1}], {0x8100, 0x9, 0xfffffffffffeffff, 0x1}}], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, @local}}}}}, 0x58) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:23 executing program 4: 21:06:23 executing program 0: 21:06:23 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffff80000001, 0x40000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4}, r1, 0xffffffffffffffff, r0, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000440)="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") mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) fcntl$getflags(r0, 0x40b) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r3, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) [ 538.470137] net_ratelimit: 14 callbacks suppressed [ 538.470143] protocol 88fb is buggy, dev hsr_slave_0 [ 538.480243] protocol 88fb is buggy, dev hsr_slave_1 21:06:24 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:24 executing program 0: [ 538.870596] protocol 88fb is buggy, dev hsr_slave_0 [ 538.876167] protocol 88fb is buggy, dev hsr_slave_1 [ 538.960359] protocol 88fb is buggy, dev hsr_slave_0 [ 538.965881] protocol 88fb is buggy, dev hsr_slave_1 21:06:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0xa04, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:24 executing program 4: 21:06:24 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000280)) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x8000008000, 0x42) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000cc0)={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @empty, @rand_addr=0x7, @loopback, @empty, @empty]}, 0x2c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x408, 0xcade, 0x5, 0x0, [0x5, 0x4ae0, 0x80000000, 0x6]}) 21:06:24 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:24 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='io.max\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x4000000000006) 21:06:24 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:24 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000000c0)=0xe1) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f0000000180)='./file1\x00', 0x1fffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:24 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) [ 539.590157] protocol 88fb is buggy, dev hsr_slave_0 [ 539.595342] protocol 88fb is buggy, dev hsr_slave_1 21:06:25 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000500)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000280)) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) [ 540.000916] protocol 88fb is buggy, dev hsr_slave_0 [ 540.006391] protocol 88fb is buggy, dev hsr_slave_1 21:06:25 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:25 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000540)=""/229, &(0x7f0000000280)=0x2d5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='cpu.stat\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000006c0)=0x7f, 0x4) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sysfs$1(0x1, &(0x7f0000000300)='\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000700)={0x90003, 0x0, [0x260, 0x5, 0xfffffffffffffff7, 0x2, 0x5364, 0x2, 0x6, 0xecd]}) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000500)=0x800) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) accept4$ax25(r1, &(0x7f0000000440)={{0x3, @rose}, [@null, @netrom, @default, @rose, @null, @rose, @netrom, @netrom]}, &(0x7f00000002c0)=0x48, 0x80800) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:25 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0xc) ptrace$getregset(0x4204, r4, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)=""/104, 0xfffffffffffffd4d}) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) fcntl$getown(r1, 0x9) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000640)={0x0, 0x9}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000009c0)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], 0x90) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x14000}, 0xc, &(0x7f0000000540)={&(0x7f0000000c40)=ANY=[@ANYBLOB="ae3900002c69743905f8255275e78242f060a55e86abbfb86ee45644f2868e5e4c3d87efc4ca660f1eea7904c0484ee51a49313a5f4d1e158c744c10c2a8071a8e6381d16bbeb9080381920b87dd3ab684efd710e0f6039da8dc06a4d1bc08c64b2f2a8e82a4852ef6a6b26195d3ce51642d00743fb3a7eedc2cc6bbae5b7b650e2960c58dbbfcb80b52da5abe720bd18efe6e1707dc12a0a781955d2ed576f7621b427f327e972921dbf181ea0e5e8ef19dae990d98c2856778709d", @ANYRES16=r6, @ANYBLOB="28022abd7000fbdbdf250f00000008000600d2020000"], 0x1c}, 0x1, 0x0, 0x0, 0x40041}, 0x10) poll(0x0, 0x0, 0xffffffff) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)=0x0) ptrace$getregset(0x4204, r7, 0x202, &(0x7f0000000380)={&(0x7f0000000340)=""/11, 0xb}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000440)='./file1\x00', &(0x7f0000000700)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000980)={0x283, 0x1}) 21:06:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:25 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) utime(&(0x7f0000000180)='./file2\x00', &(0x7f0000000200)={0x9, 0x87}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:26 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000004c0)={'nr0\x00', &(0x7f0000000440)=@ethtool_regs={0x4, 0x8, 0x5f, "bcdfc636db019c885645149faa85dd5916976142d332863a15fc16073fac1e1cf69e6adde8dd26d23297a3e691a0c958e0716fe59efb01baebb855645d8d0b1effb008f49f5af10ceb6111c028581a36f1d2af2cc0188a320e0e708ce206f4"}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file1\x00', r1}, 0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3ed) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000580)='./file1\x00', r0, &(0x7f0000000640)='./file1\x00') clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) clock_gettime(0x0, &(0x7f00000006c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000740)={{r1, r2/1000+30000}, {r3, r4/1000+10000}}, &(0x7f0000000780)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r5, 0xc1105518, &(0x7f0000000340)={{0x7, 0x2, 0x6, 0x1, 'syz0\x00', 0xffff}, 0x1, 0x3, 0x6, r6, 0x2, 0x8, 'syz1\x00', &(0x7f0000000200)=['vmnet1\x00', '\x00'], 0x8, [], [0x0, 0x1, 0xffffffffffff0001, 0x1]}) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0x200040, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:26 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xffffff94) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:26 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000180)={0x7, 0x80000000, 0x7, 0x8000, 0x80000000, "ad112544f71a83e9970767010aa2d843ed0fa2", 0x3, 0xb947}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000001", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2020000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r3, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r0}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4080}, 0x40) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:26 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:26 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0xffffffffffffff4d, 0x200) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:26 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r0 = dup(0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000180)={0xffff, 0x553, 0x8, 0x8, 0xb, 0x7fff, 0x1, 0x3ff, 0x3, 0xcab, 0xe7, 0x80000001}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) sysinfo(&(0x7f0000000440)=""/2) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) r2 = signalfd(r1, &(0x7f0000000200)={0xfff}, 0x8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000640)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000400)=0x7fff) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) getxattr(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)=@random={'os2.', 'em0ppp1}%\x03(wlan1\x00'}, &(0x7f0000000880)=""/73, 0x49) clock_nanosleep(0x1, 0x1, &(0x7f0000000380)={r4, r5+10000000}, &(0x7f00000003c0)) 21:06:26 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r0 = dup(0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:27 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xff7e) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x6d, "c4f0dbab05cf8599caf0ab52589186689c672edcf4987b1f57dcd566b1ac6b81294a22fbea504831413b8384a51b92802540f0abf4b21ca88ce34f928e3a1b9a0a0b48650c37b3198d4c68abd9979bdb8b080f5c5b8d7a4cdf1d36b63fce85bfea45fa4e1d06cbcd02c974b212"}, &(0x7f0000000440)=0x75) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000480)={r1, 0xa4e}, 0x8) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000004c0)={0x0, 0xfffffffffffffffd}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x7c4006b77ad86641, 0x6, {0x7, 0x1f, 0xffff, 0x4000, 0x7, 0x0, 0x0, 0x100000000}}, 0x50) 21:06:27 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r0 = dup(0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:27 executing program 1: r0 = open(&(0x7f0000000180)='./file0\x00', 0x80800, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0xa0, &(0x7f0000000340)=[@in6={0xa, 0x4e21, 0xb5, @ipv4={[], [], @multicast1}}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x8, @rand_addr="0895a344c1c4fa08d3f51d027ed19744", 0x77}, @in6={0xa, 0x4e21, 0x3, @ipv4={[], [], @empty}, 0xfffffffffffffffa}, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x9}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000440)={r1, 0x6}, 0x8) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x204000c000, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=ANY=[], 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:27 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) getpgid(0x0) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:27 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) r0 = syz_open_dev$admmidi(&(0x7f0000000700)='/dev/admmidi#\x00', 0x9, 0x40200) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x5, 0x81, 0xffffffff, 0x6, 0x7, 0x80000000, 0x8001, {0x0, @in6={{0xa, 0x4e24, 0x6, @empty, 0x80000000}}, 0xa889, 0x40008000000000, 0x3, 0x4d7, 0x8}}, &(0x7f00000005c0)=0xb0) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000600)={r3, 0x5, 0x8, 0x2}, &(0x7f0000000680)=0x10) syz_genetlink_get_family_id$SEG6(&(0x7f00000004c0)='SEG6\x00') poll(0x0, 0x0, 0xffffffff) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x8}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000440)={0x8, 0x101, 0x0, 0x3f, 0x3, 0x52, 0x1, 0x1000, r4}, 0x20) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) write$rfkill(r2, &(0x7f0000000480)={0x0, 0x7, 0x1, 0x1, 0x1}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r5, 0x20}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000006c0)=0x4, 0x4) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:27 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:27 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:27 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:27 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) [ 542.613896] IPVS: ftp: loaded support on port[0] = 21 21:06:28 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x80000, 0x0) sysfs$2(0x2, 0x40, &(0x7f00000008c0)=""/100) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000bc0)={0x0, 0x0, 0x2080}) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000680)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x200) mq_getsetattr(r0, &(0x7f0000000580)={0x8, 0xc8, 0xfffffffffffffff7, 0x0, 0x7fff, 0x251c, 0x3f}, &(0x7f00000005c0)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000740)=0x60000) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x9, 0x0, 0x0, 0x8000000000000}) getdents64(r0, &(0x7f0000000480)=""/236, 0xec) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000600)={r2, 0x1f}, &(0x7f0000000700)=0x8) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000002c0)={0x5, r3}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:28 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:28 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:28 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x103200, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000540)=0x8000) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000580)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_validatetrans(r0, &(0x7f0000000340)={'system_u:object_r:systemd_logger_exec_t:s0', 0x20, 'system_u:object_r:modules_dep_t:s0', 0x20, 0x9, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x7a) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x802}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r1, 0x100, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) [ 543.750192] net_ratelimit: 16 callbacks suppressed [ 543.750198] protocol 88fb is buggy, dev hsr_slave_0 [ 543.760272] protocol 88fb is buggy, dev hsr_slave_1 21:06:29 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:29 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:29 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) getpgid(0x0) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file2\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'L-', 0x1}, 0x28, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x430) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000380)={0x0, 0x0, 0x3f}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000003c0)={r3, 0x80000, r2}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, 0x0, 0x0) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:29 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) r2 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x5, 0x101080) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f00000002c0)) 21:06:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x44f5d) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) fchmodat(r0, &(0x7f0000000340)='./file1\x00', 0x80) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000180)={0xdc4c}, 0x1) [ 544.160136] protocol 88fb is buggy, dev hsr_slave_0 [ 544.165300] protocol 88fb is buggy, dev hsr_slave_1 21:06:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080), 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080), 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:29 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @dev}, &(0x7f0000000540)=0x10, 0x80000) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000580)={0x0, {0x2, 0x4e20, @rand_addr=0x81a}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x25b, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7, 0x3f, 0x580}) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) name_to_handle_at(r1, &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000440)={0x97, 0x4, "df81e07fb92d2c551ce007aba76598443b9bb1d115eb66edc1dba3f89d8965132ffd687846739dbfe7d9f811b37386dc83096f8951c1cb50add0a3a8ac78b11218765bb24cdbc1bb3c1632be62cfb309dbbf9ee2c8b40bdbd88c6d334db4f89838380d6f83df0059614f523722a3213caa3d07f81dc5748ba1b796351d016a904f48b8bbb6187419a530f027fe2cf3"}, &(0x7f00000002c0), 0x1400) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e23, @loopback}, {0x1, @link_local}, 0xcdbb1f4a30d8cb5d, {0x2, 0x4e21, @empty}, 'veth0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000140)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000200), &(0x7f00000003c0)=0x14) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="4a0500000000000000b99299d6696ad384b78ee8110200000078dc952c119436a9c1fd209eee29c68d509bb5ed771f0740659e04f499cc9b22892073ccf032d7b28726f7331a", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) [ 544.720722] protocol 88fb is buggy, dev hsr_slave_0 [ 544.726284] protocol 88fb is buggy, dev hsr_slave_1 21:06:30 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:30 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080), 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) [ 545.110552] protocol 88fb is buggy, dev hsr_slave_0 [ 545.116098] protocol 88fb is buggy, dev hsr_slave_1 [ 545.190683] protocol 88fb is buggy, dev hsr_slave_0 [ 545.196087] protocol 88fb is buggy, dev hsr_slave_1 21:06:31 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) getpgid(0x0) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:31 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x1000000000009, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000700)=0x20) keyctl$join(0x1, &(0x7f0000000740)={'syz', 0x2}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x643, 0x40) sendto$unix(r1, &(0x7f0000000340)="a13b0a7fea8b70e8fca23de354365ac20740dfe5b96323fcbc235b5f85721e120db1c7737d919f9ab637edf83c0e8bd294e50049078675a32bf383abd3e4cd0109753e8c02e25dc09ddd330747272705b08b4bb373af7a6cf14ab9ea629b6b53f455de0f60b06d1bbd6c1b0ceea151b12fccf7c8c77c1d785c1a2cd0c5a8d02e8e489dc442addb9359a20e23de8b245b85f675ba64c685831bd09e8a1de054d32e32163cdbac60f0fb31a33ebbff77a32c7ff8cb56fae75d6e2ed76520b3e5f325ec8471fdfdd686376f2a9b8728b48bfcebe2f4fff426cb265d36a12c1a47cdb481ee807211", 0xe6, 0x11, &(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10000}, 0xfffffffffffffff3, &(0x7f0000000440)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f00000000c0)="26000000130047f1eb14c1f8000322ff001000e313ffffff1f0000000000000006000500054b", 0x26) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) unlink(&(0x7f0000000180)='./file0\x00') 21:06:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:31 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:31 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x400, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000280)={0x0, 0xffffffff}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) accept4$tipc(r0, &(0x7f00000004c0), &(0x7f0000000500)=0x10, 0x80000) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/member\x00', 0x2, 0x0) 21:06:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="f0f26ea3b42e20b83ebd3c8ba63f9e848a67abb6ae5ef1c04d7a9bea03bf1891b38a5a1102769c01f1eb4e", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:32 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x408000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mISDNtimer\x00', 0x4000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) dup(r0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:32 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x9, 0xff, 0x8}) 21:06:32 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) dup(r0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) dup(r0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000), 0x2) 21:06:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000440)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, r2, 0x30, 0x1, @in6={0xa, 0x4e24, 0xf11, @loopback, 0x7}}}, 0xa0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000540)={0x0, 0x400}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000006c0)=ANY=[@ANYRES32=r4, @ANYBLOB="6c000000eb9a997753095731a370a30d28a061076654980c46962bcdd31f452286a40d2f7009e6c02d497c3035773e27e7144feb75929bf0e72fff246ee2e42369b377c75e69eea85fcbd0817ea8edd149977134fe36c09502a6b7c77d06744697e5d5382d60bbf7adc99f5176628ed6"], &(0x7f0000000640)=0x74) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000780)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, 0x0, 0x0) 21:06:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, 0x0, 0x0) 21:06:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, 0x0, 0x0) 21:06:33 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) 21:06:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000180)={0x3, 0xfffffffffffffffc, 0x1}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:33 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xffffffffffffff61) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') io_setup(0x100, &(0x7f0000000280)=0x0) io_cancel(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0xfff, r0, &(0x7f00000002c0)="031f7f496a7893eab1efb9565bcd01", 0xf, 0x9}, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:33 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="090000004a60873106f1b6dd5a5475c242970000", @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000200)={0x0, 0x0, 0x401, [], &(0x7f0000000180)=0x7}) 21:06:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) 21:06:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, &(0x7f0000000640)=0x225) unlinkat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000440)={0xb, @capture={0x1000, 0x1, {0x3, 0xd5d}, 0x7, 0xf7}}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x21c) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x17c2cb9a}, &(0x7f0000000280)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) prctl$PR_SET_FPEXC(0xc, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(r0, &(0x7f0000000740)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f00000007c0)='syz1\x00', 0x200002, 0x0) openat$cgroup(r1, 0x0, 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3) 21:06:34 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000280)="0f20d86635080000000f22d8baf80c66b836e90c8f66efbafc0ced0f79e3baa000ec83720000baa00066b8bc00000066ef66260f00110f3066b9f002000066b8ec00000066ba000000000f302e65660f765300", 0x53}], 0x1, 0x8, &(0x7f0000000480)=[@cr4={0x1, 0x42000}, @cr0={0x0, 0x20000002}], 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) [ 548.870122] net_ratelimit: 14 callbacks suppressed [ 548.870128] protocol 88fb is buggy, dev hsr_slave_0 [ 548.880225] protocol 88fb is buggy, dev hsr_slave_1 21:06:34 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) ioctl$NBD_DO_IT(r0, 0xab03) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x7, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:34 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) 21:06:34 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) socket$rds(0x15, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file1\x00') rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c0e334537c911e37d90e5bc525a47100000800", 0x800, 0x3, 0x2, 0x80000001, 0x8, 0xc61, 0x0, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000440)) 21:06:34 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) [ 549.270146] protocol 88fb is buggy, dev hsr_slave_0 [ 549.275281] protocol 88fb is buggy, dev hsr_slave_1 [ 549.350115] protocol 88fb is buggy, dev hsr_slave_0 [ 549.355276] protocol 88fb is buggy, dev hsr_slave_1 21:06:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) ioctl$RTC_WIE_ON(r0, 0x700f) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:34 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0xc, 0x4, 0xff, 0x8c05, 0x10001, 0x9, 0x0, 0x41, 0x69cc, 0x2, 0x0, 0x472, 0x2, 0x200, 0x13a4d125]}, &(0x7f0000000540)=0x100) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1}, &(0x7f0000000140)=0x8) write$selinux_create(r0, &(0x7f0000000280)=@access={'system_u:system_r:kernel_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x9}, 0x42) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:35 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0xfffffd95) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fff}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.u\xe0per\x00', 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:06:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0xea) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x7, {0x7, 0x1f, 0x0, 0x10, 0x6, 0x3, 0xe4, 0xb439}}, 0x50) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000180)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:35 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000980)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0x10e) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x2) poll(0x0, 0x0, 0xffffffff) mount$9p_fd(0x0, &(0x7f00000009c0)='./file1\x00', &(0x7f0000000a00)='9p\x00', 0x103018, &(0x7f0000000dc0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3dd8359252336653b479bf9e2e01e476784f6a2421e6694e75977fc6d02c2343a198a125a806293d99936537a3e80c73a536bd05bf296c1a52dd7dc30ee4e6f7e43d7f3028926f3355b5ffefd41cf5df248bbd16fd09301d600d25be1c4ec2939e131df69d09d25cf98018d116c4e831ad7f40bf39431bcd102c7c21adaef733d819177aea585f5e3ba3b42fdbdbd7d9b05328ce172a5260e654aa86233575a41466f3e49c8254084c75adb494eeefc42116505fa3cbfb20699517a9cf0212b8fa8fe697120f5305689f39b7b8dc3e1bda2485a2003a1b306ac4c5052498e79719", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',cache=fscache,access=', @ANYRESDEC=r1, @ANYBLOB=',mmap,cache=fscache,cache=mmap,version=9p2000.L,afid=0x0000000000000001,dfltuid=', @ANYRESHEX=r1, @ANYBLOB=',smackfsroot=/dev/full\x00,rootcontext=unconfined_u,euid<', @ANYRESDEC=r1, @ANYBLOB=',\x00']) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) recvmsg$kcm(r0, &(0x7f0000000940)={&(0x7f0000000280)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000440)=""/86, 0x56}, {&(0x7f00000004c0)=""/28, 0x1c}, {&(0x7f0000000500)=""/60, 0x3c}, {&(0x7f0000000540)=""/214, 0xd6}, {&(0x7f0000000680)=""/51, 0x33}, {&(0x7f00000006c0)=""/160, 0xa0}], 0x6}, 0x10063) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000a40)=0x100000000) 21:06:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f0000000380)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000540)={&(0x7f0000000440)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(r1, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) setxattr$security_ima(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f00000006c0)=@v2={0x7, 0x2, 0x9, 0x0, 0xbf, "f25ec3f1658a7c92936587c558aeaebe76cada3df86deda5758fa23537c25a6d6a3732daba44f23a57ea063b08ccdd117e423566ca8beb4df69db54291e48b80e4560e644c18e8121ea78b2bb90abb74302cc09c825f19f6b26a33a1dd735690cfb8d6154915f4f0360bbe90ca255bb70ab83bae3186e187b894482a3358f14be046c9a43b63659e4b912a884d633e7653645fe8f784a9d5f38fdcced4a11fb0cb2f5f22df960cb2a594fa4debb50c9fdcb60300f7264547ebae9f42ad7e07"}, 0xc9, 0x2) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') open(&(0x7f0000000180)='./file1\x00', 0x80000, 0x100) mount(&(0x7f0000000340)=@sg0='/dev/sg0\x00', &(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='tracefs\x00', 0x89, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) [ 549.990737] protocol 88fb is buggy, dev hsr_slave_0 [ 549.997175] protocol 88fb is buggy, dev hsr_slave_1 21:06:35 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:35 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:35 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000280)=0x2, 0x4) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000640)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) r1 = request_key(&(0x7f0000000180)='blacklist\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000340)='caif0\x00', 0xfffffffffffffff8) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) getresgid(&(0x7f0000000440)=0x0, &(0x7f0000000540), &(0x7f0000000580)) keyctl$chown(0x4, r1, r2, r3) [ 550.390155] protocol 88fb is buggy, dev hsr_slave_0 [ 550.395336] protocol 88fb is buggy, dev hsr_slave_1 21:06:35 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x201280834775538e) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:36 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000340)={0x43, 0x9, 0x1, {0xffffffffffffffff, 0x4, 0x2, 0xff, 0x81, 0x7, 0x1, 0xf7d0, 0xf02c}}, 0x43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc0}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 21:06:36 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0xfffffd95) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fff}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.u\xe0per\x00', 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:06:36 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) pipe2$9p(&(0x7f0000000280), 0x4000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) r0 = syz_open_dev$media(&(0x7f0000000500)='/dev/media#\x00', 0x66d9c54c, 0x0) fallocate(r0, 0x0, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000480)='./file1\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x996) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r2 = shmget(0x0, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000540)=""/214) poll(0x0, 0x0, 0xffffffff) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0xf407, 0x7e5, 0x3}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000680)={r3, 0x1ff}, &(0x7f00000006c0)=0x8) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') setxattr$security_capability(&(0x7f0000000700)='./file1\x00', &(0x7f0000000740)='security.capability\x00', &(0x7f00000008c0)=@v2={0x2000000, [{0x7, 0x7fff}, {0x5}]}, 0x14, 0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x20}, &(0x7f0000000240)=0x8) chdir(&(0x7f0000000900)='./file1/file0\x00') ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:36 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:36 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:36 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000440)={0x7, 0x2, @raw_data=[0x7, 0x7, 0x6, 0x9, 0x5, 0x2, 0x0, 0x81, 0x80, 0xffff, 0x401, 0x8, 0x5227, 0x8001, 0x7d, 0x100000000]}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x1}, &(0x7f0000000140)=0xfffffffffffffef1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:36 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendto$netrom(r0, &(0x7f0000000340)="bdc484d431bd52cba804c0edc173ed6a2afeaf668e817bc4a0ae1fe2f7a9cebbe70d3ba53e0934f88ee08ca20a7c20096a9bc59dcd9bcb4edd578308e3907991001370898f804099a10d39cba437620873eb934e0b7405a4bd97e091bd0e6c807555b28cd8712d94c8c73f30801c2d654c87dfdf985a2db362686b134ce9700c2b80b8e00d807517e46781290f158b7a78810bdaf5cfb8d199b3bd27b6", 0x9d, 0x4040050, &(0x7f0000000400)={{0x3, @null, 0x3}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f00000001c0)=0x3a5) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'caif0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96a2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/71, &(0x7f00000002c0)=0x47) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[]], 0x2) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000680), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[]}, 0x1, 0x0, 0x0, 0xc1}, 0x804) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(r2, 0x402c542b, 0x0) 21:06:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)=ANY=[@ANYBLOB="a8000000000000000000000000000000940000002557750361337a6b244bc43aad71be506c3aec2653ff9bfe5dbb55b598cfe308d0405750e1344b1e750023fe9923d22f08e8fe0136e63b990cbef17b261c9f771817a6c2e2eecda2358db45519ccd0f970431b8f3c639cbcf9438a2207a08de66f68693d0cebd6c01621403b3e75ed8dd2e96184d728e3b4ba0ad6bd6e51c0724d698e3370ab05129627f0d84f00b55c22810b0000000400000075369637f31e43b02fe5dd4155736dae0cc25d5ee43f43376dfd36f869"], 0xa8}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:06:36 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x9cd577b69d8225b3) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r1 = getpgrp(0xffffffffffffffff) sched_setattr(r1, &(0x7f0000000280)={0x30, 0x2, 0x0, 0xf06f, 0x1ff, 0x101, 0xfffffffffffffffb, 0x5}, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x20}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:37 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x81, 0x0, 0x10, &(0x7f0000ffc000/0x1000)=nil, 0x4}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="a98fb691076a81ff4db66e53f924000045"], 0x11) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) unlink(&(0x7f0000000340)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="2d000000000000000a004e22f3000003fe8000000000000000000000000000bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000df2bd5f22d43e7b72ec90d52a139649f0c766c098920423b6f2681c3634ccd32438b1ff17e3cce5de562"], 0x1) unlinkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) sendmsg$unix(r2, &(0x7f0000000700)={&(0x7f0000000580)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x4000001) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 21:06:37 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dsp\x00', 0x290100, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000500)=0x32) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160103, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000540)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x6, 0x0, "8e08ea17b9f3d49ca682c687f7d19e23958ababf4502f78b5498b39515784bc88ab43260b4fa6b92828ac7212fd0af3fd0194575b0e482e12f5a5d4f635783161da68515d62392b79a6caddd907beddb"}, 0xd8) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000680)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000900)={r2, 0x3, &(0x7f00000006c0)=[0xfff, 0xa68b, 0x6], &(0x7f0000000700)=[0x7f], 0x4, 0x9, 0x14e, &(0x7f0000000740)=[0x0, 0xffff, 0x0, 0x3, 0x6, 0x80000000, 0x2, 0x8000, 0x2], &(0x7f00000008c0)=[0x1]}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0x6c, &(0x7f0000000280)=[@in={0x2, 0x4e21, @local}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x3, 0x2, @ipv4={[], [], @loopback}, 0x6}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @remote}]}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000940)={r3, 0x2fff, 0x0, 0x80000000, 0x2}, &(0x7f0000000980)=0x18) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000a00)={r4, 0x20}, &(0x7f0000000240)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f00000009c0)) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x102, "9937c09f53c8bd40b030452116ddf176cf9ce334537c911e37d90e5bc525a471", 0x800, 0x3, 0x2, 0x401, 0x8, 0xc61, 0x5, 0x0, [0x5, 0x4ae0, 0x72, 0x6]}) 21:06:38 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:38 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:38 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) 21:06:38 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000006ec0)=[{{&(0x7f0000006740)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) 21:06:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000006ec0)=[{{&(0x7f0000006740)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) 21:06:38 executing program 0: 21:06:38 executing program 1: 21:06:38 executing program 0: 21:06:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x0, 0x0}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 21:06:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, 0x0}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) getgid() 21:06:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) 21:06:39 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:39 executing program 1: 21:06:39 executing program 5: 21:06:39 executing program 0: 21:06:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:39 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:39 executing program 1: 21:06:39 executing program 5: 21:06:39 executing program 0: 21:06:39 executing program 0: 21:06:39 executing program 1: 21:06:39 executing program 5: [ 554.150902] net_ratelimit: 16 callbacks suppressed [ 554.150945] protocol 88fb is buggy, dev hsr_slave_0 [ 554.161417] protocol 88fb is buggy, dev hsr_slave_1 [ 554.550775] protocol 88fb is buggy, dev hsr_slave_0 [ 554.556404] protocol 88fb is buggy, dev hsr_slave_1 21:06:40 executing program 5: 21:06:40 executing program 0: 21:06:40 executing program 1: 21:06:40 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:40 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:40 executing program 5: 21:06:40 executing program 0: 21:06:40 executing program 1: 21:06:40 executing program 1: 21:06:40 executing program 5: 21:06:40 executing program 0: 21:06:40 executing program 5: 21:06:40 executing program 1: 21:06:40 executing program 0: [ 555.110699] protocol 88fb is buggy, dev hsr_slave_0 [ 555.116209] protocol 88fb is buggy, dev hsr_slave_1 [ 555.520670] protocol 88fb is buggy, dev hsr_slave_0 [ 555.526157] protocol 88fb is buggy, dev hsr_slave_1 [ 555.600353] protocol 88fb is buggy, dev hsr_slave_0 [ 555.606680] protocol 88fb is buggy, dev hsr_slave_1 21:06:41 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:41 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:41 executing program 0: 21:06:41 executing program 5: 21:06:41 executing program 1: 21:06:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r0 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:41 executing program 5: 21:06:41 executing program 1: 21:06:41 executing program 0: 21:06:41 executing program 1: 21:06:41 executing program 5: 21:06:41 executing program 0: 21:06:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 21:06:42 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xd}, 0x1c) 21:06:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0xe06000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x0, 0x200000000000}) 21:06:42 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) getpgid(0x0) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:42 executing program 1: semget(0x0, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 21:06:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 21:06:42 executing program 1: sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) uname(&(0x7f0000000080)=""/2) ptrace$poke(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80, 0x1) shutdown(r2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r3 = memfd_create(&(0x7f0000000440)='\x00', 0x400000000000003) write$binfmt_misc(r3, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r3, 0x409, 0x8) gettid() fcntl$setownex(r1, 0xf, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000380)={&(0x7f0000000100), 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x9d300860c8e5b0cd}, 0x800) 21:06:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 21:06:42 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000400)=""/86, &(0x7f0000000480)=0x56) 21:06:42 executing program 5: ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0xe73) unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) fallocate(0xffffffffffffffff, 0x2, 0xfffffffffffffe01, 0x3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) rt_tgsigqueueinfo(0x0, r0, 0x23, &(0x7f0000000100)) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x3) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) ftruncate(0xffffffffffffffff, 0x1) r1 = getpgrp(r0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000003c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000480)) setpriority(0x0, 0x0, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000680)) perf_event_open(0x0, r0, 0x9, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000780)=@buf) fstatfs(0xffffffffffffffff, 0x0) 21:06:43 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) getpgid(0x0) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:43 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") pipe2(0x0, 0x0) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lstat(0x0, 0x0) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) 21:06:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$MAP_CREATE(0x0, 0x0, 0x0) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000780)='./file0\x00', 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) 21:06:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0x10) fdatasync(r0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x128) syz_genetlink_get_family_id$team(0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) getsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x4) semget(0x1, 0x3, 0x501) r4 = semget(0x0, 0x1, 0x20) semctl$GETZCNT(r4, 0x80000000000, 0xf, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in=@multicast1, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000ac0)={'eql\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000b00)={'team0\x00'}) setsockopt$inet_tcp_int(r2, 0x6, 0x24000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r2, &(0x7f0000000280)="de", 0x1, 0x4000054, 0x0, 0x0) getsockname$inet(r1, &(0x7f0000000140), &(0x7f0000000300)=0x10) clock_gettime(0x0, &(0x7f0000001a40)) sendmmsg(r2, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, 0x0}}, {{0x0, 0x33f, &(0x7f0000001980), 0x6e}}], 0x2, 0x4000014) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0x4, 0x8}) 21:06:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0x10) fdatasync(r0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x128) syz_genetlink_get_family_id$team(0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, 0xffffffffffffffff) getsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x4) semget(0x1, 0x3, 0x501) r4 = semget(0x0, 0x1, 0x20) semctl$GETZCNT(r4, 0x80000000000, 0xf, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in=@multicast1, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000ac0)={'eql\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000b00)={'team0\x00'}) setsockopt$inet_tcp_int(r2, 0x6, 0x24000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r2, &(0x7f0000000280)="de", 0x1, 0x4000054, 0x0, 0x0) getsockname$inet(r1, &(0x7f0000000140), &(0x7f0000000300)=0x10) clock_gettime(0x0, &(0x7f0000001a40)) sendmmsg(r2, &(0x7f00000019c0)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, 0x0}}, {{0x0, 0x33f, &(0x7f0000001980), 0x6e}}], 0x2, 0x4000014) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0x4, 0x8}) 21:06:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x7d1}, 0x8) write$binfmt_elf32(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 21:06:43 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) getpgid(0x0) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:43 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x8040, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_virtio(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,msize=0x0000000000000101,posixacl,cachetag=e,version=9p20']) 21:06:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 558.600261] 9pnet: Unknown protocol version 9p20 21:06:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000006e350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad32010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:06:44 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x11, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x708}, {&(0x7f00000000c0)=""/85, 0x2f}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x4}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x400000000000334, 0x6, &(0x7f0000003700)={0x77359400}) 21:06:44 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) [ 559.270511] net_ratelimit: 14 callbacks suppressed [ 559.270537] protocol 88fb is buggy, dev hsr_slave_0 [ 559.280915] protocol 88fb is buggy, dev hsr_slave_1 [ 559.670141] protocol 88fb is buggy, dev hsr_slave_0 [ 559.675260] protocol 88fb is buggy, dev hsr_slave_1 [ 559.760119] protocol 88fb is buggy, dev hsr_slave_0 [ 559.765265] protocol 88fb is buggy, dev hsr_slave_1 [ 560.390146] protocol 88fb is buggy, dev hsr_slave_0 [ 560.395262] protocol 88fb is buggy, dev hsr_slave_1 [ 560.790160] protocol 88fb is buggy, dev hsr_slave_0 [ 560.795347] protocol 88fb is buggy, dev hsr_slave_1 21:06:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf250000000000006b350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad32010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:06:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") pipe2(0x0, 0x0) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lstat(0x0, 0x0) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) 21:06:46 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x11, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x708}, {&(0x7f00000000c0)=""/85, 0x2f}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x4}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x400000000000334, 0x6, &(0x7f0000003700)={0x77359400}) 21:06:46 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:46 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:46 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmmsg(r0, &(0x7f00000014c0)=[{{&(0x7f0000000180)=@can={0x1d, r1}, 0x80, 0x0}}], 0x1, 0x0) 21:06:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000022c0)=ANY=[@ANYBLOB="200000000301fffa00fedbdf2500000000000008000000000000000000"], 0x20}}, 0x0) [ 561.239221] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 21:06:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000022c0)=ANY=[@ANYBLOB="200000000301fffa00fedbdf2500000000000008000000000000000000"], 0x20}}, 0x0) 21:06:46 executing program 5: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x1) close(r1) r2 = socket(0x100000000000011, 0x3, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87ffd) write$P9_RVERSION(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1500000065ffff0000000008003950320c"], 0x11) sendfile(r1, r3, 0x0, 0x800000000024) [ 561.345241] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 21:06:46 executing program 1: clone(0x4000003102441ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_pts(0xffffffffffffffff, 0x40000) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xffffffffbffffffe) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) wait4(0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) 21:06:46 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) setsockopt$packet_buf(r0, 0x107, 0x10000000000000f, &(0x7f0000000100)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x92, 0x0, 0x0, 0x0, 0x0, 0x8}, "05293dc5f10ba6a72ffaa84ea7a48d834c8cc2c5a338efe6"}, 0xfd55) [ 561.517232] futex_wake_op: syz-executor.1 tries to shift op by 4095; fix this program [ 561.532257] ptrace attach of "/root/syz-executor.1"[23943] was attempted by "/root/syz-executor.1"[23944] 21:06:47 executing program 5: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x1) close(r1) r2 = socket(0x100000000000011, 0x3, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87ffd) write$P9_RVERSION(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1500000065ffff0000000008003950320c"], 0x11) sendfile(r1, r3, 0x0, 0x800000000024) 21:06:49 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, &(0x7f0000000100)='TRUE', 0x4, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x5f, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) fcntl$setsig(r2, 0xa, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x2d9, 0x0, 0x0, 0x24d) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000001c0)={{0x2, 0x4e23, @broadcast}, {0x6, @local}, 0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, 'dummy0\x00'}) recvmmsg(r2, &(0x7f0000000240), 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)={0x0, r3+30000000}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f00000000c0)={0x0, 0x800, 0x14}, 0xc) 21:06:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000500)={0x0, 0x3, 0x0, 0x2000b000, &(0x7f0000009000/0x2000)=nil}) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000140)={0x0, 0x1000000000000000, &(0x7f0000008000/0x3000)=nil}) 21:06:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:49 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:49 executing program 5: 21:06:49 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000004080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002b00)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) 21:06:49 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x200000000c1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000100000013) 21:06:49 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e280000000c0b43ba5d806055b6fdd80b40000000040001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 21:06:49 executing program 1: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x4ad3a4, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 21:06:49 executing program 5: 21:06:49 executing program 5: [ 564.550191] net_ratelimit: 16 callbacks suppressed [ 564.550197] protocol 88fb is buggy, dev hsr_slave_0 [ 564.560518] protocol 88fb is buggy, dev hsr_slave_1 [ 564.950143] protocol 88fb is buggy, dev hsr_slave_0 [ 564.955271] protocol 88fb is buggy, dev hsr_slave_1 21:06:50 executing program 0: 21:06:50 executing program 1: 21:06:50 executing program 5: 21:06:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:50 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) [ 565.510120] protocol 88fb is buggy, dev hsr_slave_0 [ 565.515282] protocol 88fb is buggy, dev hsr_slave_1 21:06:50 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:50 executing program 1: 21:06:50 executing program 0: syz_open_dev$vbi(0x0, 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\xd2\x02', @ifru_flags}) 21:06:50 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='Z\x00') 21:06:51 executing program 1: renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x101000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000380)) 21:06:51 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r1, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x6000}]) 21:06:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x10001, 0xa, 0x0, 0xffffffffffffffff}) dup3(r0, r1, 0x0) 21:06:51 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0xfffffd95) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fff}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.u\xe0per\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:06:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x10001, 0xa, 0x0, 0xffffffffffffffff}) dup3(r0, r1, 0x0) 21:06:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x10001, 0xa, 0x0, 0xffffffffffffffff}) dup3(r0, r1, 0x0) [ 565.910131] protocol 88fb is buggy, dev hsr_slave_0 [ 565.915246] protocol 88fb is buggy, dev hsr_slave_1 21:06:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) [ 566.000118] protocol 88fb is buggy, dev hsr_slave_0 [ 566.005240] protocol 88fb is buggy, dev hsr_slave_1 21:06:51 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:52 executing program 0: socket$pppoe(0x18, 0x1, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 21:06:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00'}) gettid() timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 21:06:52 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x82, 0x20}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) ptrace$poke(0x5, 0x0, &(0x7f00000000c0), 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) 21:06:52 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:52 executing program 1: open(&(0x7f00000001c0)='./file0\x00', 0x8040, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_virtio(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=virtio,msize=0x0000000000000101,posixacl,cachetag=e,version=9']) 21:06:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00'}) gettid() timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 21:06:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 566.963828] 9pnet: Unknown protocol version 9 21:06:52 executing program 5: syz_open_dev$vbi(0x0, 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\xd2\x02', @ifru_flags=0x172}) 21:06:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 566.997547] 9pnet: Unknown protocol version 9 21:06:52 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:52 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:53 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:53 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800007, 0x40000000000000b}) 21:06:53 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:53 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:53 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 21:06:53 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x401, &(0x7f0000004000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x100000000000000, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e15ffe69f5460ae5871e46671e2cabac49e08fb84eddf589ddcf48bc9ef8f5a8b5053c81e5f4596e83bba700699830d1a4dea7082cc0967080ce9d510ca7cc2e7334363eb0d45fc318ea1ce02fab86e1cf111d92e5e4eee2c0473bc5fc4a077378e401ace221ea42c5b59c49c19aaec1177d9c0788e27e2c625fb879f555be8833c06691ea371f3413c8e268c7bdc1928819bf3335f48de24aeebf8537ece5fec46fd88c80266bacc0d9b16a5d5e2cc0e33b51a27ca50bbcfea997cb5e148fa13de1e0e159f94fc4ea661f31a8aa"], 0xce) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000180)) 21:06:53 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:53 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 21:06:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @remote}}) rt_sigqueueinfo(0x0, 0x0, 0x0) 21:06:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x401, &(0x7f0000004000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0xa00000000000000, 0x8}}}}}, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prctl$PR_GET_FPEXC(0xb, 0x0) 21:06:54 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:54 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:54 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:54 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:54 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x401, &(0x7f0000004000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0xa00000000000000, 0x8}}}}}, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prctl$PR_GET_FPEXC(0xb, 0x0) 21:06:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:54 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:54 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) [ 569.670128] net_ratelimit: 14 callbacks suppressed [ 569.670135] protocol 88fb is buggy, dev hsr_slave_0 [ 569.680212] protocol 88fb is buggy, dev hsr_slave_1 21:06:55 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x401, &(0x7f0000004000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0xa00000000000000, 0x8}}}}}, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prctl$PR_GET_FPEXC(0xb, 0x0) 21:06:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:55 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:55 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:55 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40045108, &(0x7f0000000180)={{}, {0x0, 0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:55 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, 0x0) 21:06:55 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:55 executing program 1: r0 = gettid() syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000080)=@gcm_128={{0x303}, "ff885224418c38d7", "22287501a9c2dd4ff06721f1796e0518", "9e837dce", "d66332f67b852997"}, 0x28) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x4, 0x3, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 570.081983] protocol 88fb is buggy, dev hsr_slave_0 [ 570.087099] protocol 88fb is buggy, dev hsr_slave_1 [ 570.150156] protocol 88fb is buggy, dev hsr_slave_0 [ 570.155347] protocol 88fb is buggy, dev hsr_slave_1 21:06:55 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:55 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, 0x0) 21:06:55 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:55 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, 0x0) [ 570.790198] protocol 88fb is buggy, dev hsr_slave_0 [ 570.795420] protocol 88fb is buggy, dev hsr_slave_1 21:06:56 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:56 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:56 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:56 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 571.190573] protocol 88fb is buggy, dev hsr_slave_0 [ 571.196231] protocol 88fb is buggy, dev hsr_slave_1 21:06:58 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a63540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aab05741d1434c9680337f9ffffffff000000000000", 0x4c}], 0x1}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) pause() ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000180)={r3, 0x80000, r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x100000000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100d0488cf56f613e0117137fb0c5fb4511fc2eb3739484e0d013cf0d445577e241f4b5d60d9599560fb46d5418e5158db2e218bd67656b", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="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"], @ANYBLOB='\x00'/24], 0x3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) perf_event_open$cgroup(&(0x7f00000005c0)={0x4, 0x70, 0x4c4d, 0xff, 0x7, 0x5, 0x0, 0x13, 0x9601, 0x1, 0x8, 0x81, 0x8, 0xff, 0x2, 0x400, 0x6, 0x6, 0x4, 0x1000, 0x80, 0x81, 0x7, 0x9, 0xfffffffffffffff7, 0x0, 0x5bd, 0x1ff, 0x7, 0x8, 0x3, 0x4, 0xb807, 0x400, 0x62, 0x4, 0xd96, 0x800, 0x0, 0x240, 0x0, @perf_config_ext={0x5, 0x3}, 0x8000, 0x4, 0x6, 0x9, 0x7, 0x1ff, 0x9}, r4, 0xffffffffffffffff, r0, 0x8) clock_gettime(0x0, &(0x7f0000005200)) 21:06:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:58 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40045108, &(0x7f0000000180)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 21:06:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7b") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:58 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(0xffffffffffffffff, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:58 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) [ 573.197547] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 573.209835] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 573.226434] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 21:06:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigprocmask(0x3, &(0x7f0000000080), 0x0, 0x8) [ 573.240825] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 573.254404] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 573.266412] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 573.325472] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 573.364359] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 21:06:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) [ 573.395423] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 573.408331] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 21:06:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:06:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) [ 573.537216] warning: process `syz-executor.0' used the deprecated sysctl system call with 21:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:59 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a63540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aab05741d1434c9680337f9ffffffff000000000000", 0x4c}], 0x1}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) pause() ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000180)={r3, 0x80000, r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x100000000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100d0488cf56f613e0117137fb0c5fb4511fc2eb3739484e0d013cf0d445577e241f4b5d60d9599560fb46d5418e5158db2e218bd67656b", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="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"], @ANYBLOB='\x00'/24], 0x3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) perf_event_open$cgroup(&(0x7f00000005c0)={0x4, 0x70, 0x4c4d, 0xff, 0x7, 0x5, 0x0, 0x13, 0x9601, 0x1, 0x8, 0x81, 0x8, 0xff, 0x2, 0x400, 0x6, 0x6, 0x4, 0x1000, 0x80, 0x81, 0x7, 0x9, 0xfffffffffffffff7, 0x0, 0x5bd, 0x1ff, 0x7, 0x8, 0x3, 0x4, 0xb807, 0x400, 0x62, 0x4, 0xd96, 0x800, 0x0, 0x240, 0x0, @perf_config_ext={0x5, 0x3}, 0x8000, 0x4, 0x6, 0x9, 0x7, 0x1ff, 0x9}, r4, 0xffffffffffffffff, r0, 0x8) clock_gettime(0x0, &(0x7f0000005200)) 21:06:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:59 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(0xffffffffffffffff, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7b") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:59 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:00 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) [ 574.950176] net_ratelimit: 16 callbacks suppressed [ 574.950182] protocol 88fb is buggy, dev hsr_slave_0 [ 574.960281] protocol 88fb is buggy, dev hsr_slave_1 [ 575.350142] protocol 88fb is buggy, dev hsr_slave_0 [ 575.355253] protocol 88fb is buggy, dev hsr_slave_1 [ 575.910213] protocol 88fb is buggy, dev hsr_slave_0 [ 575.916916] protocol 88fb is buggy, dev hsr_slave_1 [ 576.310151] protocol 88fb is buggy, dev hsr_slave_0 [ 576.315270] protocol 88fb is buggy, dev hsr_slave_1 [ 576.390145] protocol 88fb is buggy, dev hsr_slave_0 [ 576.395248] protocol 88fb is buggy, dev hsr_slave_1 21:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:02 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(0xffffffffffffffff, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7b") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) 21:07:02 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:02 executing program 1: getcwd(&(0x7f00000001c0)=""/37, 0x1010d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x0, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4fe, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') 21:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:02 executing program 1: getcwd(&(0x7f00000001c0)=""/37, 0x1010d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0x0, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0xf4fe, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x320f) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') 21:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x20080, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x82, 0x20, 0x345, 0x7f}, &(0x7f0000000240)=0x18) ptrace$poke(0x5, 0x0, &(0x7f00000000c0), 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'ip6erspan0\x00', {0x2, 0x0, @loopback}}) 21:07:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}, 0x5, 0x3, 0x7, 0x8, 0x4}, &(0x7f0000000440)=0x98) 21:07:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf0") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:05 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:05 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) [ 580.070232] net_ratelimit: 14 callbacks suppressed [ 580.070239] protocol 88fb is buggy, dev hsr_slave_0 [ 580.080321] protocol 88fb is buggy, dev hsr_slave_1 21:07:05 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000272000)) 21:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mlockall(0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 21:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x30, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x0, 0x0, 0x0) 21:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x0, 0x0, 0x0) [ 580.470144] protocol 88fb is buggy, dev hsr_slave_0 [ 580.475332] protocol 88fb is buggy, dev hsr_slave_1 [ 580.550136] protocol 88fb is buggy, dev hsr_slave_0 [ 580.555317] protocol 88fb is buggy, dev hsr_slave_1 [ 581.190222] protocol 88fb is buggy, dev hsr_slave_0 [ 581.195602] protocol 88fb is buggy, dev hsr_slave_1 [ 581.591313] protocol 88fb is buggy, dev hsr_slave_0 [ 581.596702] protocol 88fb is buggy, dev hsr_slave_1 21:07:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:08 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a63540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aab05741d1434c9680337f9ffffffff000000000000", 0x4c}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) pause() ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000180)={r2, 0x80000, r1}) r3 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x100000000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000440)=ANY=[@ANYBLOB="66696c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100d0488cf56f613e0117137fb0c5fb4511fc2eb3739484e0d013cf0d445577e241f4b5d60d9599560fb46d5418e5158db2e218bd67656b", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="0000000b000000000000000000000000000000000000d5b500000000000000000d69f8c89084e9afc736995000000000ff0102c65719abd6213ed6f08b2aaef4444e98478ef57c0156a4a5ff1e0395580a0d4d490034dee441f38a09d7f46f1293ab4c98c8000000000000e142b064893922c3345ddddd596a9abf815c001237b1af601dca3a1e641e7cc184bcc2b05c1236e32f2cfec75aee328c75d19c6d0924040adf804153d04fe69e5bba5bb5b596f3a72318feef0e6d32201d547d4a38110ef0117727b3bc8fffcc8dd224c92690ebbf0185fe2778f8ff4fef4c5381448ae7c6b8388ee512c2af2bc37f6a336d6a3b1ad219f3c83012b7f110384332d4d76bfe512d3381616f4350f9be7d0d257f4e22f81d2f41643c5976b67192da3b"], @ANYBLOB='\x00'/24], 0x3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) perf_event_open$cgroup(&(0x7f00000005c0)={0x4, 0x70, 0x4c4d, 0xff, 0x7, 0x5, 0x0, 0x13, 0x9601, 0x0, 0x8, 0x81, 0x8, 0xff, 0x2, 0x400, 0x6, 0x6, 0x4, 0x1000, 0x80, 0x81, 0x7, 0x9, 0xfffffffffffffff7, 0x0, 0x5bd, 0x1ff, 0x7, 0x8, 0x3, 0x4, 0xb807, 0x400, 0x62, 0x4, 0xd96, 0x800, 0x0, 0x240, 0x0, @perf_config_ext={0x5, 0x3}, 0x8000, 0x4, 0x6, 0x9, 0x7, 0x1ff, 0x9}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clock_gettime(0x0, &(0x7f0000005200)) 21:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x0, 0x0, 0x0) 21:07:08 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf0") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:08 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x10, 0x0, 0x0, @dev, @local, {[], @icmpv6=@ni}}}}}, 0x0) [ 583.224685] nla_parse: 32 callbacks suppressed [ 583.224692] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 583.247191] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 583.266920] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 21:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x10, 0x0, 0x0, @dev, @local, {[], @icmpv6=@ni}}}}}, 0x0) [ 583.310656] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 583.354532] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 583.387062] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 21:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x10, 0x0, 0x0, @dev, @local, {[], @icmpv6=@ni}}}}}, 0x0) [ 583.396842] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 583.411949] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 583.426226] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 583.438976] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 21:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim]}], @icmpv6=@ni}}}}}, 0x0) 21:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim]}], @icmpv6=@ni}}}}}, 0x0) 21:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @jumbo, @enc_lim]}], @icmpv6=@ni}}}}}, 0x0) 21:07:09 executing program 1: clone(0xa0184d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 585.350207] net_ratelimit: 16 callbacks suppressed [ 585.350214] protocol 88fb is buggy, dev hsr_slave_0 [ 585.360236] protocol 88fb is buggy, dev hsr_slave_1 [ 585.750160] protocol 88fb is buggy, dev hsr_slave_0 [ 585.755275] protocol 88fb is buggy, dev hsr_slave_1 21:07:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @jumbo, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf0") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:11 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000100)=""/241) 21:07:11 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:11 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0x0, &(0x7f00008b7ff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000010101000019d3fc25baf00ad1614348100002000400010013f88452a7f074ca"], 0x24}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigtimedwait(&(0x7f0000000200), 0x0, 0x0, 0x8) 21:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @jumbo, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:11 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20321798c481a14337b6d46eb98921d3dc9449901bfe9b0700000000000000943fcb2b000000000000994e3690c53ebf10e9615a9d6800aa0f"], 0x1}}, 0x0) getpid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 586.310116] protocol 88fb is buggy, dev hsr_slave_0 [ 586.315277] protocol 88fb is buggy, dev hsr_slave_1 21:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @jumbo, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) write$binfmt_elf64(r0, &(0x7f0000000a40)=ANY=[@ANYRES64, @ANYBLOB="c96673d5b0c218a03d473707ea7c4ef10d0f56573248fcbf2cc58baecad497c145b1cde333185a4c1372ce061a7321fc44f63bed80b95e561588d9b71fae82f5db2e5210a34ed946f0d85eb0abf7d5a5114c9a3ed67e833643f0c358a93748b90e7d5d59353961a02129c9d5e1a9999d7b4be96a039d1bdb3c", @ANYRESOCT, @ANYRESDEC, @ANYBLOB="a848375b98664e13862fdb986a3d4055fd8d15eb518cc10e774e2d37d1fe6fc22c1cc904ed3f7f1943ac80927f90f3dba7210c408f26a08b9748cf9d9ae1535f7ab55e982d5255c0a4cc6fd750e2f7431eeb0e3c321a48db6962f4537047e4b35560a7f514eccbed30e7b9985a4102a0359dfdb36835ab12639bfdf718a550050057ea0b61899bc5901280c866742e5d90f0a1504322f6a82fa0e56b2377e444a91b4fbd8346ede581221e37abd49c8d6c10d73402c10893177f863441d97c4e7880b4e8b94be9e964e0eef1d90450217af752e44f02c8bbf85b046aa93379bb2567ca05a8f6fcda94715135d3582f9b894f86e447f1041c3389960fa14587549c174d58d5d124a31d7cf59c64d16ca02f639443acdb2fe0c14d32fe78fae7ec31b3b55900f25c2a62107f7eeec9cf69567cdf29ad9fb8efa17c38effe2bfdec50d62c0d4d294849715137541bce5f5a2b885dbd22e22bbe9c17d0e5a80c10067165f643cc2b6d3e0bfa25c1e3e7a10560da8bc17e62b44c636cbb878f0539eb0b32b565af7f4da12403076bf6a1c6475e3daf5bced7c5783fc7f0d334c6", @ANYRESHEX, @ANYRES16, @ANYPTR64, @ANYPTR], 0x168) recvfrom$inet(r0, &(0x7f0000000280)=""/239, 0xef, 0x0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000fe0000000000000000000000003edd709a9fb933c5fcfc64c6242371213f6ff7bce3b8923573e792cd6f180e5e4819a737ab260489ea36f132"], 0x4c) 21:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) [ 586.714734] protocol 88fb is buggy, dev hsr_slave_0 [ 586.720320] protocol 88fb is buggy, dev hsr_slave_1 [ 586.790719] protocol 88fb is buggy, dev hsr_slave_0 [ 586.796400] protocol 88fb is buggy, dev hsr_slave_1 21:07:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x0, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:14 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r2, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:14 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:14 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 21:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x0, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00'], 0x1) close(r0) unlink(&(0x7f0000000040)='./bus\x00') 21:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x0, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) [ 590.470164] net_ratelimit: 14 callbacks suppressed [ 590.470171] protocol 88fb is buggy, dev hsr_slave_0 [ 590.480377] protocol 88fb is buggy, dev hsr_slave_1 [ 590.880118] protocol 88fb is buggy, dev hsr_slave_0 [ 590.885212] protocol 88fb is buggy, dev hsr_slave_1 [ 590.950124] protocol 88fb is buggy, dev hsr_slave_0 [ 590.955229] protocol 88fb is buggy, dev hsr_slave_1 [ 591.590187] protocol 88fb is buggy, dev hsr_slave_0 [ 591.595344] protocol 88fb is buggy, dev hsr_slave_1 [ 591.990163] protocol 88fb is buggy, dev hsr_slave_0 [ 591.995627] protocol 88fb is buggy, dev hsr_slave_1 21:07:17 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000100)=""/41, 0x2) close(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x2d) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x2b) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 21:07:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:17 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r2, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:17 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") socket$inet(0x2, 0x80001, 0x84) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) 21:07:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") socket$inet(0x2, 0x80001, 0x84) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x80000000, 0x800) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) open(0x0, 0x80, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x4) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000200)) memfd_create(&(0x7f0000000100)='%@\x00', 0x4) unshare(0x40000000) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x3cc, 0x1f000000) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x1, 0x100) 21:07:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") socket$inet(0x2, 0x80001, 0x84) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f4b128", 0x28, 0x0, 0x0, @dev, @local, {[@dstopts={0x0, 0x1, [], [@enc_lim, @jumbo, @enc_lim, @padn]}], @icmpv6=@ni}}}}}, 0x0) [ 593.970311] IPVS: ftp: loaded support on port[0] = 21 21:07:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:20 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:20 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r2, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:20 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x81, 0x0, 0x10, &(0x7f0000ffc000/0x1000)=nil, 0x6}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="a98fb691076a81ff4db66e53f924000045"], 0x11) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) unlink(&(0x7f0000000340)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="2d000000000000000a004e22f3000003fe8000000000000000000000000000bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000df2bd5f22d43e7b72ec90d52a139649f0c766c098920423b6f2681c3634ccd32438b1ff17e3cce5de5"], 0x1) unlinkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 21:07:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, 0x0, 0x0) 21:07:20 executing program 1: unshare(0x40000000) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400000, 0x0) fgetxattr(r0, &(0x7f00000001c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000240), 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x1) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0xffffffff) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xe, 0x8031, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 21:07:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, 0x0, 0x0) 21:07:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, 0x0, 0x0) [ 595.750192] net_ratelimit: 16 callbacks suppressed [ 595.750199] protocol 88fb is buggy, dev hsr_slave_0 [ 595.760279] protocol 88fb is buggy, dev hsr_slave_1 21:07:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001840)}], 0x1}, 0x0) 21:07:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001840)}], 0x1}, 0x0) 21:07:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001840)}], 0x1}, 0x0) [ 596.150616] protocol 88fb is buggy, dev hsr_slave_0 [ 596.156325] protocol 88fb is buggy, dev hsr_slave_1 21:07:21 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) [ 596.710777] protocol 88fb is buggy, dev hsr_slave_0 [ 596.716285] protocol 88fb is buggy, dev hsr_slave_1 [ 597.110155] protocol 88fb is buggy, dev hsr_slave_0 [ 597.116124] protocol 88fb is buggy, dev hsr_slave_1 [ 597.190174] protocol 88fb is buggy, dev hsr_slave_0 [ 597.196096] protocol 88fb is buggy, dev hsr_slave_1 21:07:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) 21:07:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty=[0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x11, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x5, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x2], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 21:07:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) dup3(r1, r0, 0x0) 21:07:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r1, &(0x7f0000000580), 0x3c1) 21:07:26 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 21:07:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x3ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x344, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) ptrace$cont(0x18, r0, 0x0, 0x0) prlimit64(r0, 0x9, &(0x7f0000000000), 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 21:07:26 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 21:07:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 21:07:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000002c0)}, 0x0) 21:07:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000002c0)}, 0x0) 21:07:26 executing program 5: memfd_create(&(0x7f0000000040)='/dev/autofs\x00', 0x0) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x8, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000280)={0x7, 0x21, 0x2}, 0x7) accept4(r0, &(0x7f00000002c0)=@caif=@dgm, &(0x7f0000000340)=0x80, 0x80800) setitimer(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x265}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x20000057d) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x7}) write$P9_RLINK(r3, &(0x7f0000000000)={0x6}, 0x5d4) sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x80) [ 601.634841] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 21:07:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000002c0)}, 0x0) [ 601.990747] protocol 88fb is buggy, dev hsr_slave_0 [ 601.996229] protocol 88fb is buggy, dev hsr_slave_1 [ 602.390142] protocol 88fb is buggy, dev hsr_slave_0 [ 602.395306] protocol 88fb is buggy, dev hsr_slave_1 21:07:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) 21:07:29 executing program 5: memfd_create(&(0x7f0000000040)='/dev/autofs\x00', 0x0) socket$packet(0x11, 0x0, 0x300) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x8, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000280)={0x7, 0x21, 0x2}, 0x7) accept4(r0, &(0x7f00000002c0)=@caif=@dgm, &(0x7f0000000340)=0x80, 0x80800) setitimer(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x265}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x400, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x20000057d) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x7}) write$P9_RLINK(r3, &(0x7f0000000000)={0x6}, 0x5d4) sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x80) 21:07:29 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:29 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000580)="11dca50d5e0bcfe47bf070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x3cc, 0xfffffffffffffffe) write$uinput_user_dev(r1, &(0x7f0000000f40)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) 21:07:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) 21:07:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) 21:07:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) [ 604.514429] encrypted_key: keyword 'new' not allowed when called from .update method 21:07:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcffc7bf070") r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) 21:07:30 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0xc0000102]}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x4044) 21:07:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000001c0)=ANY=[]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x2, [{0x186, 0x0, 0x3}]}) [ 606.150242] net_ratelimit: 16 callbacks suppressed [ 606.150248] protocol 88fb is buggy, dev hsr_slave_0 [ 606.160317] protocol 88fb is buggy, dev hsr_slave_1 [ 606.550474] protocol 88fb is buggy, dev hsr_slave_0 [ 606.555554] protocol 88fb is buggy, dev hsr_slave_1 [ 607.110191] protocol 88fb is buggy, dev hsr_slave_0 [ 607.115331] protocol 88fb is buggy, dev hsr_slave_1 21:07:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:32 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7003, 0x0) 21:07:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") close(r0) 21:07:32 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:32 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x401, &(0x7f0000004000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, 0x0, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket(0x200000000000011, 0x4000000000080002, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 607.520127] protocol 88fb is buggy, dev hsr_slave_0 [ 607.525279] protocol 88fb is buggy, dev hsr_slave_1 21:07:32 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="a712f22413815d2aa3d6bb2af914e18932b9fba997d952fef2ec80d7b3df310620f16e589f59d0b0b152912693e175a908341149021ab212433703864aca225655df41e028be7022363f49f007948b6daa8a2f50dfb72ab5521da89940a91e11e3c6b8e773"], 0x3ff800) [ 607.600127] protocol 88fb is buggy, dev hsr_slave_0 [ 607.605253] protocol 88fb is buggy, dev hsr_slave_1 21:07:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:33 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="a712f22413815d2aa3d6bb2af914e18932b9fba997d952fef2ec80d7b3df310620f16e589f59d0b0b152912693e175a908341149021ab212433703864aca225655df41e028be7022363f49f007948b6daa8a2f50dfb72ab5521da89940a91e11e3c6b8e773"], 0x3ff800) 21:07:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:33 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1004004, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)) [ 609.741732] device bridge_slave_1 left promiscuous mode [ 609.747219] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.790715] device bridge_slave_0 left promiscuous mode [ 609.796278] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.972719] device hsr_slave_1 left promiscuous mode [ 610.014755] device hsr_slave_0 left promiscuous mode [ 610.057216] team0 (unregistering): Port device team_slave_1 removed [ 610.067639] team0 (unregistering): Port device team_slave_0 removed [ 610.077706] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 610.143739] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 610.224704] bond0 (unregistering): Released all slaves 21:07:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:35 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/248, 0xf8}], 0x1, 0x0, 0x0, 0x4000}}], 0x300, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) 21:07:35 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:35 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x401, &(0x7f0000004000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, 0x0, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket(0x200000000000011, 0x4000000000080002, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:07:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x401, &(0x7f0000004000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0xffffffffffffffda, 0x3, {0x1f}}, 0x18) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, 0x0, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket(0x200000000000011, 0x4000000000080002, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:07:36 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) 21:07:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:36 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) 21:07:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 611.270700] net_ratelimit: 12 callbacks suppressed [ 611.270766] protocol 88fb is buggy, dev hsr_slave_0 [ 611.282469] protocol 88fb is buggy, dev hsr_slave_1 21:07:36 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) [ 611.670160] protocol 88fb is buggy, dev hsr_slave_0 [ 611.675304] protocol 88fb is buggy, dev hsr_slave_1 [ 611.750129] protocol 88fb is buggy, dev hsr_slave_0 [ 611.755306] protocol 88fb is buggy, dev hsr_slave_1 [ 612.790137] protocol 88fb is buggy, dev hsr_slave_0 [ 612.795299] protocol 88fb is buggy, dev hsr_slave_1 [ 613.360128] protocol 88fb is buggy, dev hsr_slave_0 [ 613.365262] protocol 88fb is buggy, dev hsr_slave_1 21:07:38 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000dcea1523674e4fc20000000000000000000000000000f3ffffffffffffff00049dec26a8eb0cf10000000000000000000000000000000000000000000000008983bc59000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000bff0e7c972e359839db8324c1c43c37fd386a773bca600de00000000000000000000000000000032118300a4c200b01d373dfe97d900010400000000090000004ba3185441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ee8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c6599000000000000063287e6662ce8a60f81e1bc1dff064ecd73e1f878fd338a2b55fd49261cf7502d1262824c28170e5908ee120f48b6b9daf83ebd487270b6b1cc921156dbe32d01ef3d0a96187c853d6e1dfa3947b29a1ff353f65588db31a9fbd9d4b422e510fce4631e6714917dae8fe053fc847257c11940f87c8a13c83165bb358a3ab663b0fcc5e578f9fcd076f5e9df3c51f705d16463b346ffa956fb30e48465d5c33f65aa752ca5850ade16d2cb0f6b3dcb535c2b4e18b21b1cde3afaed33fe94849ffeb060795a71e99bf77da45e00fbdeebc2ed09e3b1cb78626dbfe2b72545a365fc3bea33a02f461f03ebbf5eb21fa55409ffb06c189f0ccc5c301f18b4723e8ccd4bc15029738e98d1e01efdadd5ab9b4be0444c19587e49d71b656c62b3daf862b42e9de40ae6b69595085a6e8a39cc8176043d6ed9f2e7c71de68ba5bc76197152da39cc90091fac6dc41dc12a2d9b044acb9c36f03d69bd6c1394275c6665873def52f60be84e5a52e9388e77342861a0304c00100000ebf8b4af8e8e23bf608d7cf22f54c4336e53501c1488a492b729bd86de1b032227e1262bf95f35b4535c14ab01742b583a7ee221246e970c876331d8a0f7bb67dbfce096000339a146117581312255d7fcd5538fb3cf897fef07181bb0ec66a4c6e6f718ade97c5cb202d791e92483463d499771ce1676fdd019a456c1e4a63923b661af"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) [ 614.575569] audit: type=1400 audit(1564520859.950:243): avc: denied { map } for pid=24898 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13810 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 615.570176] IPVS: ftp: loaded support on port[0] = 21 [ 615.914137] chnl_net:caif_netlink_parms(): no params data found [ 615.950747] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.957210] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.964604] device bridge_slave_0 entered promiscuous mode [ 615.971543] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.977928] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.985117] device bridge_slave_1 entered promiscuous mode [ 616.004567] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 616.013435] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 616.032283] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 616.039378] team0: Port device team_slave_0 added [ 616.044895] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 616.051987] team0: Port device team_slave_1 added [ 616.057148] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 616.064556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 616.132423] device hsr_slave_0 entered promiscuous mode [ 616.171239] device hsr_slave_1 entered promiscuous mode [ 616.210517] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 616.217464] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 616.231889] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.238225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 616.244906] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.251304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.279973] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 616.286401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 616.295375] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 616.307555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 616.314808] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.321669] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.331640] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 616.337715] 8021q: adding VLAN 0 to HW filter on device team0 [ 616.346892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 616.354596] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.360996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.370594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 616.378165] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.384674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 616.400353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 616.414519] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 616.425745] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 616.436285] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 616.443139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 616.450388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 616.457915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 616.465687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 616.473505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 616.488157] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 616.498064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 616.570190] net_ratelimit: 12 callbacks suppressed [ 616.570195] protocol 88fb is buggy, dev hsr_slave_0 [ 616.580229] protocol 88fb is buggy, dev hsr_slave_1 [ 616.690148] protocol 88fb is buggy, dev hsr_slave_0 [ 616.695252] protocol 88fb is buggy, dev hsr_slave_1 [ 616.810148] protocol 88fb is buggy, dev hsr_slave_0 [ 616.815420] protocol 88fb is buggy, dev hsr_slave_1 [ 616.900494] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 616.930696] protocol 88fb is buggy, dev hsr_slave_0 [ 616.935768] protocol 88fb is buggy, dev hsr_slave_1 [ 616.950147] protocol 88fb is buggy, dev hsr_slave_0 [ 616.955245] protocol 88fb is buggy, dev hsr_slave_1 21:07:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0xffffffffffffff89, 0x0}}], 0x4000000000000ac, 0x43, 0x0) 21:07:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="e00000027f0000010000000002000000ac1414bbc1d10c6d"], 0x18) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000231000)={@multicast2, @loopback, @broadcast}, 0xc) 21:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:43 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) 21:07:43 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:43 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:07:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:43 executing program 4: 21:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x2c3}, {&(0x7f00000019c0)=ANY=[@ANYBLOB="b803000500"/16], 0x9c}], 0x4}, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 21:07:43 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) [ 618.730476] device bridge_slave_1 left promiscuous mode [ 618.736120] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.790998] device bridge_slave_0 left promiscuous mode [ 618.800587] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.957402] device hsr_slave_1 left promiscuous mode [ 618.994098] device hsr_slave_0 left promiscuous mode [ 619.046037] team0 (unregistering): Port device team_slave_1 removed [ 619.055054] team0 (unregistering): Port device team_slave_0 removed [ 619.065595] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 619.093269] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 619.174966] bond0 (unregistering): Released all slaves [ 621.440224] IPVS: ftp: loaded support on port[0] = 21 [ 621.670161] net_ratelimit: 16 callbacks suppressed [ 621.670165] protocol 88fb is buggy, dev hsr_slave_0 [ 621.680228] protocol 88fb is buggy, dev hsr_slave_1 [ 621.835654] IPVS: ftp: loaded support on port[0] = 21 [ 621.887242] chnl_net:caif_netlink_parms(): no params data found [ 621.954550] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.961002] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.968000] device bridge_slave_0 entered promiscuous mode [ 621.975153] bridge0: port 2(bridge_slave_1) entered blocking state [ 621.981608] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.988878] device bridge_slave_1 entered promiscuous mode [ 622.011574] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 622.022117] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 622.053999] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 622.061329] team0: Port device team_slave_0 added [ 622.069615] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 622.076410] protocol 88fb is buggy, dev hsr_slave_0 [ 622.076445] protocol 88fb is buggy, dev hsr_slave_1 [ 622.087061] team0: Port device team_slave_1 added [ 622.118212] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 622.144078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 622.151601] protocol 88fb is buggy, dev hsr_slave_0 [ 622.151645] protocol 88fb is buggy, dev hsr_slave_1 [ 622.222591] device hsr_slave_0 entered promiscuous mode [ 622.260479] device hsr_slave_1 entered promiscuous mode [ 622.300409] chnl_net:caif_netlink_parms(): no params data found [ 622.317091] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 622.331436] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 622.348345] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.354802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.361532] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.367877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 622.398662] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.406314] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.413705] device bridge_slave_0 entered promiscuous mode [ 622.421133] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.427550] bridge0: port 2(bridge_slave_1) entered disabled state [ 622.434691] device bridge_slave_1 entered promiscuous mode [ 622.460539] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 622.469829] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 622.495044] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 622.502681] team0: Port device team_slave_0 added [ 622.508752] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 622.516055] team0: Port device team_slave_1 added [ 622.521530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 622.529358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 622.592579] device hsr_slave_0 entered promiscuous mode [ 622.630406] device hsr_slave_1 entered promiscuous mode [ 622.691111] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 622.698841] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 622.719165] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.725574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.732227] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.738565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 622.768140] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 622.774550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 622.783625] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 622.797622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 622.804941] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.811905] bridge0: port 2(bridge_slave_1) entered disabled state [ 622.819270] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.826148] bridge0: port 2(bridge_slave_1) entered disabled state [ 622.835898] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 622.842659] 8021q: adding VLAN 0 to HW filter on device team0 [ 622.851579] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 622.866725] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 622.874229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 622.882462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 622.889967] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.896348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 622.905085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 622.916234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 622.924339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 622.932265] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.938617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.948461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 622.955926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 622.965604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 622.974999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 622.983089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 622.993452] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 623.003358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 623.013209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 623.021384] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 623.027491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 623.035651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 623.043439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 623.051161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 623.058630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 623.065812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 623.073246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 623.083356] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 623.089426] 8021q: adding VLAN 0 to HW filter on device team0 [ 623.098244] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 623.106682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 623.116392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 623.124063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 623.131796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 623.139171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 623.146774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 623.154227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 623.162049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 623.170393] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.176729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.185752] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 623.192253] protocol 88fb is buggy, dev hsr_slave_0 [ 623.192315] protocol 88fb is buggy, dev hsr_slave_1 [ 623.203594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 623.216347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 623.224967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 623.233339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 623.241572] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.247896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.259785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 623.268248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 623.277099] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 623.285552] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 623.296416] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 623.304627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 623.312797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 623.320154] protocol 88fb is buggy, dev hsr_slave_0 [ 623.320838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 623.325255] protocol 88fb is buggy, dev hsr_slave_1 [ 623.335770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 623.347751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 623.355439] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 623.363209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 623.371341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 623.378877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 623.386750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 623.397676] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 623.407201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 623.414157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 623.422416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 623.436328] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 623.442941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 623.458744] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 623.468579] 8021q: adding VLAN 0 to HW filter on device batadv0 21:07:49 executing program 1: 21:07:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:49 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r3, 0x9) r4 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) sendfile(r2, r3, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:49 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:49 executing program 4: 21:07:49 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xfffffffffffffdfe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xc0, 0xd77]}) 21:07:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:50 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 21:07:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:50 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r2, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(r1, r2, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:50 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x200000000c1}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x40605346, &(0x7f0000000280)) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000100000013) 21:07:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) [ 627.350145] net_ratelimit: 32 callbacks suppressed [ 627.350150] protocol 88fb is buggy, dev hsr_slave_0 [ 627.360203] protocol 88fb is buggy, dev hsr_slave_1 21:07:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000140)=""/5, 0x5}, {&(0x7f0000000200)=""/219, 0xdb}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000a00)=""/195, 0xc3}, {&(0x7f0000000300)=""/87, 0x57}, {&(0x7f0000000b00)=""/208, 0xd0}, {&(0x7f0000000c00)=""/228, 0xe4}, {&(0x7f0000000880)=""/135, 0x87}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x9, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x400, 0x1007fffffff, 0x0, 0xa6}, 0x0) setpriority(0x0, 0x0, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 21:07:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:52 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r2 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:52 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r2, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(r1, r2, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:52 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x200000000c1}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x40605346, &(0x7f0000000280)) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000100000013) 21:07:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r'}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:53 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) dup3(r0, r1, 0x0) [ 627.760545] protocol 88fb is buggy, dev hsr_slave_0 [ 627.765995] protocol 88fb is buggy, dev hsr_slave_1 21:07:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r'}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 21:07:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r'}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) [ 627.910797] protocol 88fb is buggy, dev hsr_slave_0 [ 627.916371] protocol 88fb is buggy, dev hsr_slave_1 [ 628.000618] protocol 88fb is buggy, dev hsr_slave_0 [ 628.006019] protocol 88fb is buggy, dev hsr_slave_1 [ 628.310128] protocol 88fb is buggy, dev hsr_slave_0 [ 628.315294] protocol 88fb is buggy, dev hsr_slave_1 21:07:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:07:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) 21:07:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setrlimit(0x7, &(0x7f0000000000)) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000200)={0x4}) 21:07:55 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000440), 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r1 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r1) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:55 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000440), 0x20) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) fcntl$getown(r2, 0x9) r3 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r3) sendfile(r1, r2, 0x0, 0x8000) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) 21:07:55 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x200000000c1}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x40605346, &(0x7f0000000280)) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000100000013) 21:07:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x2, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x1c00, 0x4004400}) 21:07:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) 21:07:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) 21:07:56 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev}}, 0x24) listen(0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40100, 0x0) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, &(0x7f0000000100)) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x1, 0x3}, 0xf) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000001400)=""/4096, 0x1000}, {0x0}], 0x2, 0x2) syz_open_dev$usbmon(0x0, 0x26, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$audion(0x0, 0x0, 0x20001) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_misc(r2, 0x0, 0x0) io_setup(0x101, &(0x7f0000000040)) shmat(0xffffffffffffffff, &(0x7f0000c14000/0x13000)=nil, 0x1000) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) 21:07:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x1303}) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 21:07:56 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000440), 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x7f8) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) r1 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r1) prctl$PR_SVE_SET_VL(0x32, 0x21dc2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) setreuid(0x0, 0xee00) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x588e, 0x0) [ 631.132170] kasan: CONFIG_KASAN_INLINE enabled [ 631.240367] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 631.262165] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 631.268467] Modules linked in: [ 631.271669] CPU: 1 PID: 25107 Comm: syz-executor.4 Not tainted 4.14.134 #30 [ 631.278796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.288154] task: ffff888093b20700 task.stack: ffff88803e840000 [ 631.294326] RIP: 0010:rxrpc_connect_call+0xc9/0x41a0 [ 631.299435] RSP: 0018:ffff88803e847738 EFLAGS: 00010206 [ 631.304798] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90010c74000 [ 631.312073] RDX: 0000000000000003 RSI: ffffffff8593c089 RDI: 0000000000000018 [ 631.319337] RBP: ffff88803e847880 R08: 0000000000000001 R09: ffff888093b20fa0 [ 631.326603] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888032fbdc00 [ 631.333867] R13: ffff888049d232e0 R14: ffff888049d232d0 R15: ffff88803e847998 [ 631.341134] FS: 00007fd74e508700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 631.349355] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 631.355228] CR2: 000000000070f158 CR3: 0000000055796000 CR4: 00000000001406e0 [ 631.362521] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 631.369964] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 631.377226] Call Trace: [ 631.379821] ? trace_hardirqs_on_caller+0x400/0x590 [ 631.384846] ? rxrpc_discard_expired_client_conns+0x7e0/0x7e0 [ 631.390736] ? rxrpc_connect_call+0x10/0x41a0 [ 631.395226] rxrpc_new_client_call+0x8f7/0x1420 [ 631.399925] ? rxrpc_do_sendmsg+0x91a/0x1103 [ 631.404320] rxrpc_do_sendmsg+0x91a/0x1103 [ 631.408537] ? rxrpc_kernel_send_data+0x470/0x470 [ 631.413364] rxrpc_sendmsg+0x48a/0x650 [ 631.417257] ? security_socket_sendmsg+0x89/0xb0 [ 631.421996] ? rxrpc_sock_destructor+0x130/0x130 [ 631.426740] sock_sendmsg+0xce/0x110 [ 631.430490] ___sys_sendmsg+0x349/0x840 [ 631.434458] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 631.439198] ? __fget+0x210/0x370 [ 631.442632] ? lock_downgrade+0x6e0/0x6e0 [ 631.446768] ? __fget+0x237/0x370 [ 631.450214] ? __fget_light+0x172/0x1f0 [ 631.454168] ? __fdget+0x1b/0x20 [ 631.457514] ? sockfd_lookup_light+0xb4/0x160 [ 631.461991] __sys_sendmmsg+0x152/0x3a0 [ 631.465947] ? SyS_sendmsg+0x50/0x50 [ 631.469661] ? retint_kernel+0x2d/0x2d [ 631.473528] ? trace_hardirqs_on_caller+0x400/0x590 [ 631.478533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.483339] ? check_preemption_disabled+0x3c/0x250 [ 631.488336] ? __sys_sendmmsg+0x3a0/0x3a0 [ 631.492466] SyS_sendmmsg+0x35/0x60 [ 631.496076] ? __sys_sendmmsg+0x3a0/0x3a0 [ 631.500220] do_syscall_64+0x1e8/0x640 [ 631.504093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 631.508920] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 631.514101] RIP: 0033:0x459829 [ 631.517279] RSP: 002b:00007fd74e507c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 631.524983] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 631.532229] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000003 [ 631.539478] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 631.546746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd74e5086d4 [ 631.554002] R13: 00000000004c7000 R14: 00000000004dc570 R15: 00000000ffffffff [ 631.561254] Code: e8 03 80 3c 18 00 0f 85 6f 39 00 00 48 8b 85 28 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 39 00 00 48 8b 5b 18 48 8d bb 00 02 00 00 [ 631.580631] RIP: rxrpc_connect_call+0xc9/0x41a0 RSP: ffff88803e847738 [ 631.596903] ---[ end trace d3b478c6e54533f2 ]--- [ 631.601913] Kernel panic - not syncing: Fatal exception [ 631.605495] kobject: 'loop1' (ffff8880a4a006a0): kobject_uevent_env [ 631.614980] Kernel Offset: disabled [ 631.618599] Rebooting in 86400 seconds..