0c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, 0x0, 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 619.373291][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.379179][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 619.385051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.390808][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 619.535675][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.542449][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x0, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x0, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:09 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, 0x0, 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:11 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, 0x0, 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) [ 623.533013][ C0] net_ratelimit: 18 callbacks suppressed [ 623.533021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 623.544595][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 623.550383][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 623.556147][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 623.693085][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 623.698931][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 623.853003][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 623.858874][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x801, 0x0) r1 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r1, &(0x7f0000177ff4), 0xc) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r3, 0x79, 0x8000020, r4, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000003c0)={r5, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r6, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r6, 0xffffffffffffffff, 0x0) 10:44:14 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 624.735265][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 624.741063][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:14 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0xb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="2fa866bd42ffda443304072a8abf3f9ebb594fcdff0de38f43b7f347574495f417dc25f9504d36b79f8d178bc0d3ace48757b64b680cb0672de87cfe2291d1d79d81122ac6a05825cd46bb479f6150f93ac13959df473865407bcfbc843ca229d5342357d9d6aafbd448d3ef87ea4a8ecaffe8aa60eb0a645d08ea37e0afab7c32b934396ccf4da144e570ec67d6a34792a540e12b68e09f9bbefd29fc2b8b87d7c9966d7d5153ef5647d15fb30ae6fea84446e3294f"]}}, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) waitid(0x1, 0x0, &(0x7f0000000340), 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfe0f) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, 0x0, 0x40) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x9) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x4400, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) 10:44:14 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0xb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="2fa866bd42ffda443304072a8abf3f9ebb594fcdff0de38f43b7f347574495f417dc25f9504d36b79f8d178bc0d3ace48757b64b680cb0672de87cfe2291d1d79d81122ac6a05825cd46bb479f6150f93ac13959df473865407bcfbc843ca229d5342357d9d6aafbd448d3ef87ea4a8ecaffe8aa60eb0a645d08ea37e0afab7c32b934396ccf4da144e570ec67d6a34792a540e12b68e09f9bbefd29fc2b8b87d7c9966d7d5153ef5647d15fb30ae6fea84446e3294f"]}}, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) waitid(0x1, 0x0, &(0x7f0000000340), 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfe0f) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, 0x0, 0x40) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x9) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x4400, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) 10:44:15 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0xb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="2fa866bd42ffda443304072a8abf3f9ebb594fcdff0de38f43b7f347574495f417dc25f9504d36b79f8d178bc0d3ace48757b64b680cb0672de87cfe2291d1d79d81122ac6a05825cd46bb479f6150f93ac13959df473865407bcfbc843ca229d5342357d9d6aafbd448d3ef87ea4a8ecaffe8aa60eb0a645d08ea37e0afab7c32b934396ccf4da144e570ec67d6a34792a540e12b68e09f9bbefd29fc2b8b87d7c9966d7d5153ef5647d15fb30ae6fea84446e3294f"]}}, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) waitid(0x1, 0x0, &(0x7f0000000340), 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfe0f) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, 0x0, 0x40) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x9) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x4400, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) 10:44:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:15 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r6, 0xffffffffffffffff, 0x0) 10:44:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r6, 0xffffffffffffffff, 0x0) 10:44:16 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0xb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="2fa866bd42ffda443304072a8abf3f9ebb594fcdff0de38f43b7f347574495f417dc25f9504d36b79f8d178bc0d3ace48757b64b680cb0672de87cfe2291d1d79d81122ac6a05825cd46bb479f6150f93ac13959df473865407bcfbc843ca229d5342357d9d6aafbd448d3ef87ea4a8ecaffe8aa60eb0a645d08ea37e0afab7c32b934396ccf4da144e570ec67d6a34792a540e12b68e09f9bbefd29fc2b8b87d7c9966d7d5153ef5647d15fb30ae6fea84446e3294f"]}}, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) waitid(0x1, 0x0, &(0x7f0000000340), 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfe0f) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, 0x0, 0x40) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x9) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x4400, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000180)) 10:44:16 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:16 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0xb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="2fa866bd42ffda443304072a8abf3f9ebb594fcdff0de38f43b7f347574495f417dc25f9504d36b79f8d178bc0d3ace48757b64b680cb0672de87cfe2291d1d79d81122ac6a05825cd46bb479f6150f93ac13959df473865407bcfbc843ca229d5342357d9d6aafbd448d3ef87ea4a8ecaffe8aa60eb0a645d08ea37e0afab7c32b934396ccf4da144e570ec67d6a34792a540e12b68e09f9bbefd29fc2b8b87d7c9966d7d5153ef5647d15fb30ae6fea84446e3294f"]}}, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) waitid(0x1, 0x0, &(0x7f0000000340), 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfe0f) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, 0x0, 0x40) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x9) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x4400, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000180)) 10:44:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:17 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r6, 0xffffffffffffffff, 0x0) 10:44:17 executing program 0 (fault-call:22 fault-nth:0): r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:17 executing program 2 (fault-call:3 fault-nth:0): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 628.151296][T19155] FAULT_INJECTION: forcing a failure. [ 628.151296][T19155] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 628.174472][T19155] CPU: 0 PID: 19155 Comm: syz-executor.2 Not tainted 5.0.0-rc5-next-20190208 #31 [ 628.183677][T19155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.193729][T19155] Call Trace: [ 628.197018][T19155] dump_stack+0x172/0x1f0 [ 628.201374][T19155] should_fail.cold+0xa/0x15 [ 628.206063][T19155] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 628.211866][T19155] ? ___might_sleep+0x163/0x280 [ 628.216734][T19155] should_fail_alloc_page+0x50/0x60 [ 628.221938][T19155] __alloc_pages_nodemask+0x1a1/0x7e0 [ 628.227336][T19155] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 628.233065][T19155] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 628.239311][T19155] alloc_pages_current+0x107/0x210 [ 628.244439][T19155] pte_alloc_one+0x1b/0x1a0 [ 628.248945][T19155] do_huge_pmd_anonymous_page+0xa5d/0x17e0 [ 628.254745][T19155] ? _raw_spin_unlock_irq+0x28/0x90 [ 628.259936][T19155] ? lockdep_hardirqs_on+0x418/0x5d0 [ 628.265388][T19155] ? trace_hardirqs_on+0x61/0x230 [ 628.270507][T19155] ? __thp_get_unmapped_area+0x190/0x190 [ 628.276216][T19155] ? pmd_val+0x100/0x100 [ 628.280479][T19155] __handle_mm_fault+0x2d5e/0x3ec0 [ 628.285592][T19155] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 628.291132][T19155] ? find_held_lock+0x35/0x130 [ 628.295891][T19155] ? handle_mm_fault+0x322/0xb30 [ 628.300834][T19155] ? kasan_check_read+0x11/0x20 [ 628.305681][T19155] handle_mm_fault+0x43f/0xb30 [ 628.310447][T19155] __get_user_pages+0x7b6/0x1a40 [ 628.315479][T19155] ? mark_held_locks+0xf0/0xf0 [ 628.320341][T19155] ? follow_page_mask+0x19a0/0x19a0 [ 628.325548][T19155] get_user_pages_locked+0x243/0x470 [ 628.330838][T19155] kernel_get_mempolicy+0x53b/0xe20 [ 628.336039][T19155] ? sp_free+0x70/0x70 [ 628.340112][T19155] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 628.345566][T19155] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 628.351016][T19155] ? do_syscall_64+0x26/0x610 [ 628.355703][T19155] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.361763][T19155] ? do_syscall_64+0x26/0x610 [ 628.366421][T19155] __x64_sys_get_mempolicy+0xbe/0x150 [ 628.371770][T19155] do_syscall_64+0x103/0x610 [ 628.376337][T19155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.382207][T19155] RIP: 0033:0x457e39 [ 628.386081][T19155] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.405659][T19155] RSP: 002b:00007f3bbc69dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 628.414045][T19155] RAX: ffffffffffffffda RBX: 00007f3bbc69dc90 RCX: 0000000000457e39 [ 628.421999][T19155] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 628.429946][T19155] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 628.437899][T19155] R10: 0000000020548000 R11: 0000000000000246 R12: 00007f3bbc69e6d4 [ 628.445851][T19155] R13: 00000000004be6c0 R14: 00000000004cf1a0 R15: 0000000000000004 10:44:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:18 executing program 2 (fault-call:3 fault-nth:1): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 628.615767][T19165] FAULT_INJECTION: forcing a failure. [ 628.615767][T19165] name failslab, interval 1, probability 0, space 0, times 1 [ 628.635190][T19165] CPU: 1 PID: 19165 Comm: syz-executor.2 Not tainted 5.0.0-rc5-next-20190208 #31 [ 628.644325][T19165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.654483][T19165] Call Trace: [ 628.657772][T19165] dump_stack+0x172/0x1f0 [ 628.662103][T19165] should_fail.cold+0xa/0x15 [ 628.666698][T19165] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 628.672505][T19165] ? lock_downgrade+0x880/0x880 [ 628.677354][T19165] ? ___might_sleep+0x163/0x280 [ 628.682202][T19165] __should_failslab+0x121/0x190 [ 628.687142][T19165] should_failslab+0x9/0x14 [ 628.691639][T19165] kmem_cache_alloc+0x2be/0x710 [ 628.696490][T19165] ? mark_held_locks+0xf0/0xf0 [ 628.701245][T19165] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 628.707486][T19165] ptlock_alloc+0x20/0x70 [ 628.711808][T19165] pte_alloc_one+0x6d/0x1a0 [ 628.716303][T19165] do_huge_pmd_anonymous_page+0xa5d/0x17e0 [ 628.722082][T19165] ? __lock_acquire+0x54b/0x4790 [ 628.727027][T19165] ? __thp_get_unmapped_area+0x190/0x190 [ 628.732678][T19165] ? pmd_val+0x100/0x100 [ 628.736911][T19165] __handle_mm_fault+0x2d5e/0x3ec0 [ 628.741995][T19165] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 628.747512][T19165] ? find_held_lock+0x35/0x130 [ 628.752255][T19165] ? handle_mm_fault+0x322/0xb30 [ 628.757193][T19165] ? kasan_check_read+0x11/0x20 [ 628.762023][T19165] handle_mm_fault+0x43f/0xb30 [ 628.766857][T19165] __get_user_pages+0x7b6/0x1a40 [ 628.771767][T19165] ? mark_held_locks+0xf0/0xf0 [ 628.776524][T19165] ? follow_page_mask+0x19a0/0x19a0 [ 628.781705][T19165] get_user_pages_locked+0x243/0x470 [ 628.786971][T19165] kernel_get_mempolicy+0x53b/0xe20 [ 628.792321][T19165] ? sp_free+0x70/0x70 [ 628.796375][T19165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 628.801817][T19165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 628.807255][T19165] ? do_syscall_64+0x26/0x610 [ 628.811921][T19165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.817975][T19165] ? do_syscall_64+0x26/0x610 [ 628.822648][T19165] __x64_sys_get_mempolicy+0xbe/0x150 [ 628.828002][T19165] do_syscall_64+0x103/0x610 [ 628.832577][T19165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.838444][T19165] RIP: 0033:0x457e39 [ 628.842317][T19165] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.862447][T19165] RSP: 002b:00007f3bbc69dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 628.870955][T19165] RAX: ffffffffffffffda RBX: 00007f3bbc69dc90 RCX: 0000000000457e39 [ 628.878905][T19165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 628.886852][T19165] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 628.894022][ C0] net_ratelimit: 27 callbacks suppressed [ 628.894029][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 628.894798][T19165] R10: 0000000020548000 R11: 0000000000000246 R12: 00007f3bbc69e6d4 10:44:18 executing program 2 (fault-call:3 fault-nth:2): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 628.900480][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 628.906129][T19165] R13: 00000000004be6c0 R14: 00000000004cf1a0 R15: 0000000000000004 10:44:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 629.053051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 629.058873][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 629.106765][T19177] FAULT_INJECTION: forcing a failure. [ 629.106765][T19177] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 629.120236][T19177] CPU: 1 PID: 19177 Comm: syz-executor.2 Not tainted 5.0.0-rc5-next-20190208 #31 [ 629.129439][T19177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.139492][T19177] Call Trace: [ 629.142799][T19177] dump_stack+0x172/0x1f0 [ 629.147143][T19177] should_fail.cold+0xa/0x15 [ 629.151765][T19177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.157589][T19177] ? ___might_sleep+0x163/0x280 [ 629.162467][T19177] should_fail_alloc_page+0x50/0x60 [ 629.167699][T19177] __alloc_pages_nodemask+0x1a1/0x7e0 [ 629.173079][T19177] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 629.178811][T19177] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 629.185057][T19177] alloc_pages_current+0x107/0x210 [ 629.190172][T19177] pte_alloc_one+0x1b/0x1a0 [ 629.194672][T19177] do_huge_pmd_anonymous_page+0xa5d/0x17e0 [ 629.200475][T19177] ? finish_task_switch+0x146/0x790 [ 629.205677][T19177] ? __thp_get_unmapped_area+0x190/0x190 [ 629.211323][T19177] ? pmd_val+0x100/0x100 [ 629.215575][T19177] __handle_mm_fault+0x2d5e/0x3ec0 [ 629.220705][T19177] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 629.226263][T19177] ? find_held_lock+0x35/0x130 [ 629.231037][T19177] ? handle_mm_fault+0x322/0xb30 [ 629.235985][T19177] ? kasan_check_read+0x11/0x20 [ 629.240838][T19177] handle_mm_fault+0x43f/0xb30 [ 629.245598][T19177] __get_user_pages+0x7b6/0x1a40 [ 629.250533][T19177] ? __rwsem_down_read_failed_common.part.0+0x80/0x80 [ 629.257309][T19177] ? follow_page_mask+0x19a0/0x19a0 [ 629.262521][T19177] get_user_pages_locked+0x1ca/0x470 [ 629.267813][T19177] kernel_get_mempolicy+0x53b/0xe20 [ 629.273010][T19177] ? sp_free+0x70/0x70 [ 629.277079][T19177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.282534][T19177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.287989][T19177] ? do_syscall_64+0x26/0x610 [ 629.292663][T19177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.298723][T19177] ? do_syscall_64+0x26/0x610 [ 629.303418][T19177] __x64_sys_get_mempolicy+0xbe/0x150 [ 629.308883][T19177] do_syscall_64+0x103/0x610 [ 629.313478][T19177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.319362][T19177] RIP: 0033:0x457e39 [ 629.323253][T19177] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 629.342877][T19177] RSP: 002b:00007f3bbc69dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef 10:44:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r6, 0xffffffffffffffff, 0x0) [ 629.351287][T19177] RAX: ffffffffffffffda RBX: 00007f3bbc69dc90 RCX: 0000000000457e39 [ 629.359256][T19177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 629.367232][T19177] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 629.375205][T19177] R10: 0000000020548000 R11: 0000000000000246 R12: 00007f3bbc69e6d4 [ 629.383172][T19177] R13: 00000000004be6c0 R14: 00000000004cf1a0 R15: 0000000000000004 10:44:18 executing program 2 (fault-call:3 fault-nth:3): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 629.563905][T19190] FAULT_INJECTION: forcing a failure. [ 629.563905][T19190] name failslab, interval 1, probability 0, space 0, times 0 [ 629.601055][T19190] CPU: 1 PID: 19190 Comm: syz-executor.2 Not tainted 5.0.0-rc5-next-20190208 #31 [ 629.610178][T19190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.620215][T19190] Call Trace: [ 629.623523][T19190] dump_stack+0x172/0x1f0 [ 629.627877][T19190] should_fail.cold+0xa/0x15 [ 629.632454][T19190] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.638272][T19190] ? lock_downgrade+0x880/0x880 [ 629.643122][T19190] ? ___might_sleep+0x163/0x280 [ 629.647970][T19190] __should_failslab+0x121/0x190 [ 629.652899][T19190] should_failslab+0x9/0x14 [ 629.657403][T19190] kmem_cache_alloc+0x2be/0x710 [ 629.662269][T19190] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 629.668507][T19190] ptlock_alloc+0x20/0x70 [ 629.672848][T19190] pte_alloc_one+0x6d/0x1a0 [ 629.677424][T19190] do_huge_pmd_anonymous_page+0xa5d/0x17e0 [ 629.683232][T19190] ? __lock_acquire+0x54b/0x4790 [ 629.688284][T19190] ? __thp_get_unmapped_area+0x190/0x190 [ 629.693940][T19190] ? pmd_val+0x100/0x100 [ 629.698190][T19190] __handle_mm_fault+0x2d5e/0x3ec0 [ 629.703305][T19190] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 629.708857][T19190] ? find_held_lock+0x35/0x130 [ 629.713621][T19190] ? handle_mm_fault+0x322/0xb30 [ 629.718552][T19190] ? kasan_check_read+0x11/0x20 [ 629.723388][T19190] handle_mm_fault+0x43f/0xb30 [ 629.728141][T19190] __get_user_pages+0x7b6/0x1a40 [ 629.733075][T19190] ? mark_held_locks+0xf0/0xf0 [ 629.737845][T19190] ? follow_page_mask+0x19a0/0x19a0 [ 629.743039][T19190] ? get_user_pages_locked+0x1a4/0x470 [ 629.748496][T19190] get_user_pages_locked+0x1ca/0x470 [ 629.753876][T19190] kernel_get_mempolicy+0x53b/0xe20 [ 629.759061][T19190] ? sp_free+0x70/0x70 [ 629.763126][T19190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.768583][T19190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.773371][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 629.774035][T19190] ? do_syscall_64+0x26/0x610 [ 629.774059][T19190] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.774083][T19190] ? do_syscall_64+0x26/0x610 [ 629.774099][T19190] __x64_sys_get_mempolicy+0xbe/0x150 [ 629.774121][T19190] do_syscall_64+0x103/0x610 [ 629.779867][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 629.784487][T19190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.784499][T19190] RIP: 0033:0x457e39 [ 629.784511][T19190] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 629.784523][T19190] RSP: 002b:00007f3bbc69dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 629.790666][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 629.795212][T19190] RAX: ffffffffffffffda RBX: 00007f3bbc69dc90 RCX: 0000000000457e39 10:44:19 executing program 2 (fault-call:3 fault-nth:4): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 629.795220][T19190] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 629.795228][T19190] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 629.795240][T19190] R10: 0000000020548000 R11: 0000000000000246 R12: 00007f3bbc69e6d4 [ 629.800646][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 629.805153][T19190] R13: 00000000004be6c0 R14: 00000000004cf1a0 R15: 0000000000000004 [ 629.809072][T19152] FAULT_INJECTION: forcing a failure. [ 629.809072][T19152] name failslab, interval 1, probability 0, space 0, times 0 [ 629.889231][T19152] CPU: 1 PID: 19152 Comm: syz-executor.0 Not tainted 5.0.0-rc5-next-20190208 #31 [ 629.913061][T19152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.913067][T19152] Call Trace: [ 629.913088][T19152] dump_stack+0x172/0x1f0 [ 629.913110][T19152] should_fail.cold+0xa/0x15 [ 629.913128][T19152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.913145][T19152] ? br_get_link_af_size_filtered+0x13c/0xa00 [ 629.913160][T19152] ? find_held_lock+0x35/0x130 [ 629.913178][T19152] __should_failslab+0x121/0x190 [ 629.913195][T19152] should_failslab+0x9/0x14 [ 629.913211][T19152] kmem_cache_alloc_node+0x56/0x710 [ 629.913234][T19152] __alloc_skb+0xd5/0x5e0 [ 629.913256][T19152] ? skb_trim+0x190/0x190 [ 629.913275][T19152] ? if_nlmsg_size+0x4b8/0xa00 [ 629.933034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 629.935674][T19152] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 629.935694][T19152] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 629.940038][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 629.944585][T19152] rtmsg_ifinfo+0x8d/0xa0 [ 629.944602][T19152] __dev_notify_flags+0x235/0x2c0 [ 629.944620][T19152] ? dev_change_name+0xa00/0xa00 [ 630.025908][T19152] ? __dev_change_flags+0x513/0x6e0 [ 630.031105][T19152] ? dev_set_allmulti+0x30/0x30 [ 630.035949][T19152] ? mutex_trylock+0x1e0/0x1e0 [ 630.040713][T19152] ? find_held_lock+0x35/0x130 [ 630.045582][T19152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.051836][T19152] dev_change_flags+0x10d/0x170 [ 630.056692][T19152] dev_ifsioc+0x2b0/0x940 [ 630.061029][T19152] ? register_gifconf+0x70/0x70 [ 630.065876][T19152] dev_ioctl+0x1b8/0xc70 [ 630.070131][T19152] sock_do_ioctl+0x1bd/0x300 [ 630.074723][T19152] ? compat_ifr_data_ioctl+0x160/0x160 [ 630.080200][T19152] ? kasan_check_read+0x11/0x20 [ 630.085066][T19152] ? mark_held_locks+0xf0/0xf0 [ 630.089825][T19152] sock_ioctl+0x32b/0x610 [ 630.094143][T19152] ? dlci_ioctl_set+0x40/0x40 [ 630.098845][T19152] ? __fget+0x340/0x540 [ 630.102988][T19152] ? find_held_lock+0x35/0x130 [ 630.107735][T19152] ? __fget+0x340/0x540 [ 630.111872][T19152] ? dlci_ioctl_set+0x40/0x40 [ 630.116555][T19152] do_vfs_ioctl+0xd6e/0x1390 [ 630.121134][T19152] ? ioctl_preallocate+0x210/0x210 [ 630.126228][T19152] ? __fget+0x367/0x540 [ 630.130382][T19152] ? ksys_dup3+0x3e0/0x3e0 [ 630.134795][T19152] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 630.141026][T19152] ? fput+0x128/0x1a0 [ 630.145002][T19152] ? security_file_ioctl+0x93/0xc0 [ 630.150100][T19152] ksys_ioctl+0xab/0xd0 [ 630.154254][T19152] __x64_sys_ioctl+0x73/0xb0 [ 630.158833][T19152] do_syscall_64+0x103/0x610 [ 630.163411][T19152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.169293][T19152] RIP: 0033:0x457e39 [ 630.173195][T19152] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.192812][T19152] RSP: 002b:00007fe6d81bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 630.201208][T19152] RAX: ffffffffffffffda RBX: 00007fe6d81bac90 RCX: 0000000000457e39 [ 630.209176][T19152] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000003 [ 630.217126][T19152] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 630.225074][T19152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe6d81bb6d4 [ 630.233029][T19152] R13: 00000000004c34e6 R14: 00000000004d6250 R15: 000000000000000d 10:44:19 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:19 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x2, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:20 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x10, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:20 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x50, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:20 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x5000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:20 executing program 1 (fault-call:3 fault-nth:0): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:20 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x100000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 631.091731][T19236] FAULT_INJECTION: forcing a failure. [ 631.091731][T19236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 631.105534][T19236] CPU: 0 PID: 19236 Comm: syz-executor.1 Not tainted 5.0.0-rc5-next-20190208 #31 [ 631.114645][T19236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.124711][T19236] Call Trace: [ 631.128010][T19236] dump_stack+0x172/0x1f0 [ 631.132435][T19236] should_fail.cold+0xa/0x15 [ 631.137036][T19236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.142842][T19236] ? ___might_sleep+0x163/0x280 [ 631.147699][T19236] should_fail_alloc_page+0x50/0x60 [ 631.152891][T19236] __alloc_pages_nodemask+0x1a1/0x7e0 [ 631.158354][T19236] ? __lock_acquire+0x54b/0x4790 [ 631.163309][T19236] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 631.169026][T19236] ? mark_held_locks+0xf0/0xf0 [ 631.173782][T19236] ? mark_held_locks+0xf0/0xf0 [ 631.178535][T19236] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 631.184790][T19236] alloc_pages_current+0x107/0x210 [ 631.189913][T19236] pte_alloc_one+0x1b/0x1a0 [ 631.194412][T19236] do_huge_pmd_anonymous_page+0xa5d/0x17e0 [ 631.200223][T19236] ? __lock_acquire+0x54b/0x4790 [ 631.205188][T19236] ? __thp_get_unmapped_area+0x190/0x190 [ 631.210826][T19236] ? pmd_val+0x100/0x100 [ 631.215070][T19236] __handle_mm_fault+0x2d5e/0x3ec0 [ 631.220182][T19236] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 631.225727][T19236] ? find_held_lock+0x35/0x130 [ 631.230499][T19236] ? handle_mm_fault+0x322/0xb30 [ 631.235458][T19236] ? kasan_check_read+0x11/0x20 [ 631.240320][T19236] handle_mm_fault+0x43f/0xb30 [ 631.245099][T19236] __get_user_pages+0x7b6/0x1a40 [ 631.250043][T19236] ? mark_held_locks+0xf0/0xf0 [ 631.254810][T19236] ? follow_page_mask+0x19a0/0x19a0 [ 631.260008][T19236] get_user_pages_locked+0x243/0x470 [ 631.265379][T19236] kernel_get_mempolicy+0x53b/0xe20 [ 631.270595][T19236] ? sp_free+0x70/0x70 [ 631.274673][T19236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.280146][T19236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.285616][T19236] ? do_syscall_64+0x26/0x610 [ 631.290323][T19236] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.296387][T19236] ? do_syscall_64+0x26/0x610 [ 631.301077][T19236] __x64_sys_get_mempolicy+0xbe/0x150 [ 631.306446][T19236] do_syscall_64+0x103/0x610 [ 631.311036][T19236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.316923][T19236] RIP: 0033:0x457e39 [ 631.320816][T19236] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:44:20 executing program 3 (fault-call:5 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:20 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x1000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 631.340411][T19236] RSP: 002b:00007f895b02cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 631.348822][T19236] RAX: ffffffffffffffda RBX: 00007f895b02cc90 RCX: 0000000000457e39 [ 631.356794][T19236] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 631.364758][T19236] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 631.372717][T19236] R10: 0000000020548000 R11: 0000000000000246 R12: 00007f895b02d6d4 [ 631.380664][T19236] R13: 00000000004be6c0 R14: 00000000004cf1a0 R15: 0000000000000004 10:44:21 executing program 1 (fault-call:3 fault-nth:1): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 631.530798][T19251] FAULT_INJECTION: forcing a failure. [ 631.530798][T19251] name failslab, interval 1, probability 0, space 0, times 0 [ 631.560632][T19252] FAULT_INJECTION: forcing a failure. [ 631.560632][T19252] name failslab, interval 1, probability 0, space 0, times 0 [ 631.584625][T19252] CPU: 0 PID: 19252 Comm: syz-executor.1 Not tainted 5.0.0-rc5-next-20190208 #31 [ 631.593756][T19252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.603804][T19252] Call Trace: [ 631.607098][T19252] dump_stack+0x172/0x1f0 [ 631.611450][T19252] should_fail.cold+0xa/0x15 [ 631.616056][T19252] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.621860][T19252] ? lock_downgrade+0x880/0x880 [ 631.626714][T19252] ? ___might_sleep+0x163/0x280 [ 631.631568][T19252] __should_failslab+0x121/0x190 [ 631.636507][T19252] should_failslab+0x9/0x14 [ 631.641017][T19252] kmem_cache_alloc+0x2be/0x710 [ 631.645865][T19252] ? mark_held_locks+0xf0/0xf0 [ 631.650631][T19252] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 631.656874][T19252] ptlock_alloc+0x20/0x70 [ 631.661212][T19252] pte_alloc_one+0x6d/0x1a0 [ 631.665714][T19252] do_huge_pmd_anonymous_page+0xa5d/0x17e0 [ 631.671518][T19252] ? __lock_acquire+0x54b/0x4790 [ 631.676458][T19252] ? __thp_get_unmapped_area+0x190/0x190 [ 631.682086][T19252] ? pmd_val+0x100/0x100 [ 631.686334][T19252] __handle_mm_fault+0x2d5e/0x3ec0 [ 631.691441][T19252] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 631.696981][T19252] ? find_held_lock+0x35/0x130 [ 631.701742][T19252] ? handle_mm_fault+0x322/0xb30 [ 631.706689][T19252] ? kasan_check_read+0x11/0x20 [ 631.711541][T19252] handle_mm_fault+0x43f/0xb30 [ 631.716308][T19252] __get_user_pages+0x7b6/0x1a40 [ 631.721241][T19252] ? mark_held_locks+0xf0/0xf0 [ 631.726018][T19252] ? follow_page_mask+0x19a0/0x19a0 [ 631.731238][T19252] get_user_pages_locked+0x243/0x470 [ 631.736537][T19252] kernel_get_mempolicy+0x53b/0xe20 [ 631.741738][T19252] ? sp_free+0x70/0x70 [ 631.745811][T19252] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.751269][T19252] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.756726][T19252] ? do_syscall_64+0x26/0x610 [ 631.761397][T19252] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.767454][T19252] ? do_syscall_64+0x26/0x610 [ 631.772134][T19252] __x64_sys_get_mempolicy+0xbe/0x150 [ 631.777504][T19252] do_syscall_64+0x103/0x610 [ 631.782091][T19252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.787978][T19252] RIP: 0033:0x457e39 [ 631.795227][T19252] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.814842][T19252] RSP: 002b:00007f895b02cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 631.826461][T19252] RAX: ffffffffffffffda RBX: 00007f895b02cc90 RCX: 0000000000457e39 [ 631.836024][T19252] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 631.845990][T19252] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 631.855911][T19252] R10: 0000000020548000 R11: 0000000000000246 R12: 00007f895b02d6d4 [ 631.863883][T19252] R13: 00000000004be6c0 R14: 00000000004cf1a0 R15: 0000000000000004 [ 631.873448][T19251] CPU: 1 PID: 19251 Comm: syz-executor.3 Not tainted 5.0.0-rc5-next-20190208 #31 [ 631.894827][T19251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.904880][T19251] Call Trace: [ 631.908162][T19251] dump_stack+0x172/0x1f0 [ 631.912586][T19251] should_fail.cold+0xa/0x15 [ 631.917198][T19251] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.928475][T19251] ? lock_downgrade+0x880/0x880 [ 631.933334][T19251] ? ___might_sleep+0x163/0x280 [ 631.938197][T19251] __should_failslab+0x121/0x190 [ 631.943451][T19251] should_failslab+0x9/0x14 [ 631.947951][T19251] kmem_cache_alloc+0x2be/0x710 [ 631.952802][T19251] ? check_preemption_disabled+0x48/0x290 [ 631.958750][T19251] ? wait_for_completion+0x440/0x440 [ 631.964025][T19251] getname_flags+0xd6/0x5b0 [ 631.968536][T19251] user_path_at_empty+0x2f/0x50 [ 631.973372][T19251] ksys_chdir+0x98/0x1f0 [ 631.977591][T19251] ? __ia32_sys_access+0x80/0x80 [ 631.982526][T19251] ? do_syscall_64+0x26/0x610 [ 631.987199][T19251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.993245][T19251] ? do_syscall_64+0x26/0x610 [ 631.997903][T19251] ? lockdep_hardirqs_on+0x418/0x5d0 [ 632.003169][T19251] __x64_sys_chdir+0x31/0x40 [ 632.007749][T19251] do_syscall_64+0x103/0x610 [ 632.012324][T19251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.018199][T19251] RIP: 0033:0x457e39 [ 632.022072][T19251] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.041782][T19251] RSP: 002b:00007f7d6b788c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000050 [ 632.050638][T19251] RAX: ffffffffffffffda RBX: 00007f7d6b788c90 RCX: 0000000000457e39 [ 632.058750][T19251] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000480 [ 632.066714][T19251] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 632.074796][T19251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d6b7896d4 [ 632.082911][T19251] R13: 00000000004bd630 R14: 00000000004ce768 R15: 0000000000000004 10:44:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x2, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:21 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x2000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:21 executing program 1 (fault-call:3 fault-nth:2): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 632.200027][T19262] FAULT_INJECTION: forcing a failure. [ 632.200027][T19262] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 632.220195][T19262] CPU: 1 PID: 19262 Comm: syz-executor.1 Not tainted 5.0.0-rc5-next-20190208 #31 [ 632.229332][T19262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.239384][T19262] Call Trace: [ 632.242700][T19262] dump_stack+0x172/0x1f0 [ 632.247047][T19262] should_fail.cold+0xa/0x15 [ 632.251643][T19262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 632.251660][T19262] ? ___might_sleep+0x163/0x280 [ 632.251694][T19262] should_fail_alloc_page+0x50/0x60 [ 632.262311][T19262] __alloc_pages_nodemask+0x1a1/0x7e0 [ 632.262331][T19262] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 632.262356][T19262] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 632.284891][T19262] alloc_pages_current+0x107/0x210 [ 632.290007][T19262] pte_alloc_one+0x1b/0x1a0 [ 632.294516][T19262] do_huge_pmd_anonymous_page+0xa5d/0x17e0 [ 632.300379][T19262] ? finish_task_switch+0x146/0x790 [ 632.305603][T19262] ? __thp_get_unmapped_area+0x190/0x190 [ 632.311268][T19262] ? pmd_val+0x100/0x100 [ 632.316019][T19262] __handle_mm_fault+0x2d5e/0x3ec0 [ 632.321178][T19262] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 632.326724][T19262] ? find_held_lock+0x35/0x130 [ 632.331488][T19262] ? handle_mm_fault+0x322/0xb30 [ 632.336434][T19262] ? kasan_check_read+0x11/0x20 [ 632.341284][T19262] handle_mm_fault+0x43f/0xb30 [ 632.346136][T19262] __get_user_pages+0x7b6/0x1a40 [ 632.351080][T19262] ? __rwsem_down_read_failed_common.part.0+0x80/0x80 [ 632.357844][T19262] ? follow_page_mask+0x19a0/0x19a0 [ 632.363050][T19262] get_user_pages_locked+0x1ca/0x470 [ 632.368339][T19262] kernel_get_mempolicy+0x53b/0xe20 [ 632.373536][T19262] ? sp_free+0x70/0x70 [ 632.377610][T19262] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 632.383061][T19262] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 632.388522][T19262] ? do_syscall_64+0x26/0x610 [ 632.393208][T19262] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.399277][T19262] ? do_syscall_64+0x26/0x610 [ 632.403957][T19262] __x64_sys_get_mempolicy+0xbe/0x150 [ 632.409448][T19262] do_syscall_64+0x103/0x610 [ 632.414059][T19262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.419943][T19262] RIP: 0033:0x457e39 [ 632.423834][T19262] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.443432][T19262] RSP: 002b:00007f895b02cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 632.451859][T19262] RAX: ffffffffffffffda RBX: 00007f895b02cc90 RCX: 0000000000457e39 [ 632.459847][T19262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 632.467821][T19262] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 632.475791][T19262] R10: 0000000020548000 R11: 0000000000000246 R12: 00007f895b02d6d4 [ 632.483758][T19262] R13: 00000000004be6c0 R14: 00000000004cf1a0 R15: 0000000000000004 10:44:22 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:22 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x50000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:22 executing program 3 (fault-call:5 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:22 executing program 1 (fault-call:3 fault-nth:3): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:22 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x10000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 632.699585][T19285] FAULT_INJECTION: forcing a failure. [ 632.699585][T19285] name failslab, interval 1, probability 0, space 0, times 0 [ 632.731423][T19285] CPU: 0 PID: 19285 Comm: syz-executor.3 Not tainted 5.0.0-rc5-next-20190208 #31 [ 632.740673][T19285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.750743][T19285] Call Trace: [ 632.754125][T19285] dump_stack+0x172/0x1f0 [ 632.758476][T19285] should_fail.cold+0xa/0x15 [ 632.763078][T19285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 632.768888][T19285] ? lock_downgrade+0x880/0x880 [ 632.773828][T19285] ? ___might_sleep+0x163/0x280 [ 632.778698][T19285] __should_failslab+0x121/0x190 [ 632.783635][T19285] should_failslab+0x9/0x14 [ 632.788135][T19285] kmem_cache_alloc+0x2be/0x710 [ 632.793000][T19285] ? trace_hardirqs_on+0x67/0x230 [ 632.798021][T19285] ? kasan_check_read+0x11/0x20 [ 632.802876][T19285] __fuse_request_alloc+0x2d/0x2e0 [ 632.808074][T19285] __fuse_get_req+0x4ac/0x9c0 [ 632.812763][T19285] ? fuse_put_request+0x520/0x520 [ 632.817786][T19285] ? check_preemption_disabled+0x48/0x290 [ 632.823524][T19285] ? finish_wait+0x260/0x260 [ 632.828118][T19285] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 632.830222][T19287] FAULT_INJECTION: forcing a failure. [ 632.830222][T19287] name failslab, interval 1, probability 0, space 0, times 0 [ 632.834271][T19285] ? putname+0xef/0x130 [ 632.834290][T19285] fuse_simple_request+0x28/0x730 [ 632.834308][T19285] fuse_access+0x247/0x310 [ 632.834322][T19285] ? fuse_dentry_release+0x50/0x50 [ 632.834352][T19285] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 632.871722][T19285] fuse_permission+0x465/0x530 [ 632.876497][T19285] ? getname_flags+0x277/0x5b0 [ 632.881273][T19285] ? fuse_getattr+0x360/0x360 [ 632.885951][T19285] inode_permission+0x36d/0x570 [ 632.890801][T19285] ? user_path_at_empty+0x43/0x50 [ 632.895846][T19285] ksys_chdir+0xdc/0x1f0 [ 632.900089][T19285] ? __ia32_sys_access+0x80/0x80 [ 632.905029][T19285] ? do_syscall_64+0x26/0x610 [ 632.909701][T19285] ? lockdep_hardirqs_on+0x418/0x5d0 [ 632.915002][T19285] __x64_sys_chdir+0x31/0x40 [ 632.919596][T19285] do_syscall_64+0x103/0x610 [ 632.924191][T19285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.930078][T19285] RIP: 0033:0x457e39 [ 632.933970][T19285] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.953569][T19285] RSP: 002b:00007f7d6b788c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000050 [ 632.961996][T19285] RAX: ffffffffffffffda RBX: 00007f7d6b788c90 RCX: 0000000000457e39 [ 632.969960][T19285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000480 [ 632.977924][T19285] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 632.985891][T19285] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d6b7896d4 10:44:22 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x100000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 632.993868][T19285] R13: 00000000004bd630 R14: 00000000004ce768 R15: 0000000000000004 [ 633.018296][T19287] CPU: 1 PID: 19287 Comm: syz-executor.1 Not tainted 5.0.0-rc5-next-20190208 #31 [ 633.027431][T19287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.037488][T19287] Call Trace: [ 633.040790][T19287] dump_stack+0x172/0x1f0 [ 633.045150][T19287] should_fail.cold+0xa/0x15 [ 633.049756][T19287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.055567][T19287] ? lock_downgrade+0x880/0x880 [ 633.060409][T19287] ? ___might_sleep+0x163/0x280 [ 633.065242][T19287] __should_failslab+0x121/0x190 [ 633.070166][T19287] should_failslab+0x9/0x14 [ 633.074648][T19287] kmem_cache_alloc+0x2be/0x710 [ 633.079497][T19287] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 633.085738][T19287] ptlock_alloc+0x20/0x70 [ 633.090047][T19287] pte_alloc_one+0x6d/0x1a0 [ 633.094532][T19287] do_huge_pmd_anonymous_page+0xa5d/0x17e0 [ 633.100322][T19287] ? __lock_acquire+0x54b/0x4790 [ 633.105242][T19287] ? __thp_get_unmapped_area+0x190/0x190 [ 633.110848][T19287] ? pmd_val+0x100/0x100 [ 633.115085][T19287] __handle_mm_fault+0x2d5e/0x3ec0 [ 633.120186][T19287] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 633.125722][T19287] ? find_held_lock+0x35/0x130 [ 633.130485][T19287] ? handle_mm_fault+0x322/0xb30 [ 633.135415][T19287] ? kasan_check_read+0x11/0x20 [ 633.140243][T19287] handle_mm_fault+0x43f/0xb30 [ 633.144996][T19287] __get_user_pages+0x7b6/0x1a40 [ 633.149918][T19287] ? mark_held_locks+0xf0/0xf0 [ 633.154675][T19287] ? follow_page_mask+0x19a0/0x19a0 [ 633.159859][T19287] ? get_user_pages_locked+0x1a4/0x470 [ 633.165300][T19287] get_user_pages_locked+0x1ca/0x470 [ 633.170568][T19287] kernel_get_mempolicy+0x53b/0xe20 [ 633.175742][T19287] ? sp_free+0x70/0x70 [ 633.179794][T19287] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 633.185235][T19287] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 633.190703][T19287] ? do_syscall_64+0x26/0x610 [ 633.195404][T19287] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.201473][T19287] ? do_syscall_64+0x26/0x610 [ 633.206130][T19287] __x64_sys_get_mempolicy+0xbe/0x150 [ 633.211500][T19287] do_syscall_64+0x103/0x610 [ 633.216087][T19287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.221969][T19287] RIP: 0033:0x457e39 [ 633.225867][T19287] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:44:22 executing program 1 (fault-call:3 fault-nth:4): r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 633.245445][T19287] RSP: 002b:00007f895b02cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 633.253836][T19287] RAX: ffffffffffffffda RBX: 00007f895b02cc90 RCX: 0000000000457e39 [ 633.261790][T19287] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 633.269770][T19287] RBP: 000000000073bf00 R08: 0000000000000003 R09: 0000000000000000 [ 633.277718][T19287] R10: 0000000020548000 R11: 0000000000000246 R12: 00007f895b02d6d4 [ 633.285666][T19287] R13: 00000000004be6c0 R14: 00000000004cf1a0 R15: 0000000000000004 10:44:22 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x200000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:23 executing program 3 (fault-call:5 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:23 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:23 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x5000000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:23 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 633.891633][T19330] FAULT_INJECTION: forcing a failure. [ 633.891633][T19330] name failslab, interval 1, probability 0, space 0, times 0 [ 633.932847][T19330] CPU: 1 PID: 19330 Comm: syz-executor.3 Not tainted 5.0.0-rc5-next-20190208 #31 [ 633.941997][T19330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.952056][T19330] Call Trace: [ 633.955378][T19330] dump_stack+0x172/0x1f0 [ 633.959728][T19330] should_fail.cold+0xa/0x15 [ 633.964345][T19330] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.970161][T19330] ? lock_downgrade+0x880/0x880 [ 633.975036][T19330] ? ___might_sleep+0x163/0x280 [ 633.979921][T19330] __should_failslab+0x121/0x190 [ 633.984878][T19330] should_failslab+0x9/0x14 [ 633.989379][T19330] kmem_cache_alloc+0x2be/0x710 [ 633.994227][T19330] ? trace_hardirqs_on+0x67/0x230 [ 633.999258][T19330] ? kasan_check_read+0x11/0x20 [ 634.004117][T19330] __fuse_request_alloc+0x2d/0x2e0 [ 634.009234][T19330] __fuse_get_req+0x4ac/0x9c0 [ 634.013913][T19330] ? fuse_put_request+0x520/0x520 [ 634.019436][T19330] ? check_preemption_disabled+0x48/0x290 [ 634.025155][T19330] ? finish_wait+0x260/0x260 [ 634.029753][T19330] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 634.035907][T19330] ? putname+0xef/0x130 [ 634.040058][T19330] fuse_simple_request+0x28/0x730 [ 634.045078][T19330] fuse_access+0x247/0x310 [ 634.049498][T19330] ? fuse_dentry_release+0x50/0x50 [ 634.054659][T19330] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 634.060385][T19330] fuse_permission+0x465/0x530 [ 634.065148][T19330] ? getname_flags+0x277/0x5b0 [ 634.069907][T19330] ? fuse_getattr+0x360/0x360 [ 634.074580][T19330] inode_permission+0x36d/0x570 [ 634.079425][T19330] ? user_path_at_empty+0x43/0x50 [ 634.084449][T19330] ksys_chdir+0xdc/0x1f0 [ 634.088691][T19330] ? __ia32_sys_access+0x80/0x80 [ 634.093628][T19330] ? do_syscall_64+0x26/0x610 [ 634.098298][T19330] ? lockdep_hardirqs_on+0x418/0x5d0 [ 634.103585][T19330] __x64_sys_chdir+0x31/0x40 [ 634.108180][T19330] do_syscall_64+0x103/0x610 [ 634.112769][T19330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.118651][T19330] RIP: 0033:0x457e39 10:44:23 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x8000000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:23 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x2, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 634.122541][T19330] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 634.142221][T19330] RSP: 002b:00007f7d6b788c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000050 [ 634.150624][T19330] RAX: ffffffffffffffda RBX: 00007f7d6b788c90 RCX: 0000000000457e39 [ 634.158591][T19330] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000480 [ 634.166560][T19330] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 634.174523][T19330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d6b7896d4 [ 634.174532][T19330] R13: 00000000004bd630 R14: 00000000004ce768 R15: 0000000000000004 [ 634.190579][ C0] net_ratelimit: 18 callbacks suppressed [ 634.190587][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 634.190640][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 634.190723][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 634.190768][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 634.191152][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 634.191200][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 634.252991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 634.258800][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:23 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x10, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:23 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0xffffffff00000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:23 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x50, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:24 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x4) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x5000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 3 (fault-call:5 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:24 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x420000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x9) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x100000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:24 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) msync(&(0x7f0000069000/0x2000)=nil, 0x2000, 0x2) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) fdatasync(r0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0x200) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x296) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x1000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="3f951114cef7fa07498b1fe2c291267f"], 0x10) 10:44:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x24080, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000001c0)={0x9, 0x2, 0x4, 0x100000, {0x77359400}, {0x1, 0x2, 0x5, 0x7, 0xec, 0x5, "86c0b448"}, 0x1, 0x5, @fd=r1, 0x4}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x2000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) [ 635.373014][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 635.378927][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:25 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req3={0xa5, 0xa1cb, 0x8001, 0x955, 0x6, 0x6f, 0x1}, 0x1c) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000180)={0x8, 0x0, 0x191cb1bb, 0x0, 0x4, 0x9, 0x4}) 10:44:25 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x50000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:25 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000040)=0x800) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x36}) 10:44:25 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x10000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:25 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$TIOCCONS(r1, 0x541d) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)=ANY=[@ANYBLOB="0700000000000000ffff0000000000000800000000000000", @ANYRES32=r1, @ANYBLOB="000800000000000000000000ff000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000010000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="000000001f0000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000010100000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000ff0100000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000520600000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000ffff00000000000000000000000000000000000000000000"]) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:25 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x100000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)={0x10, 0x0, 0x6}, 0x10) 10:44:25 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5450, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:25 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x880, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000440)={0xfff}, 0x4) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x8}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000140)=""/229, 0xe5}, 0x40002040) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000480)=ANY=[@ANYBLOB="0100000024000000080000000619000000ffffffff721ae56717000000400000008100000002000000090000"]) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x7}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e21, 0x7764, @mcast2, 0xe02}}}, 0x84) 10:44:25 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x200000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,u=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0xffffffffffffff80) 10:44:25 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:26 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(0xffffffffffffffff, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:26 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x5000000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ac00"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1f79895a, 0x4000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000004c0)=""/221, &(0x7f0000000080)=0xdd) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:26 executing program 2: r0 = userfaultfd(0x800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x100, 0x16, 0x789, 0x6, "de0f849a96c5718a4dc0b3e98db3c75d7c478144da9a963c7aaa2a1702f38918"}) 10:44:26 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x8000000000000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="54e1f83e12913e643d00", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000440)={0xe904, 0x6, 0x0, 0xbe, &(0x7f0000000340)=""/190, 0x4b, &(0x7f0000000280)=""/75, 0x2, &(0x7f0000000400)=""/2}) read$FUSE(r1, &(0x7f0000000880), 0x119f) chdir(&(0x7f0000000480)='./file0\x00') lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000580)={0xffffffffffff2d10, 0x3cb6, 0x1f, 0x4, 0x8, 0x100}) setfsgid(r2) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="1000000000000000"], 0x10) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000004c0)={[0x50, 0x9, 0x100, 0x3, 0x0, 0x80000000, 0x9e, 0x7, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x4, 0x2, 0x20], 0x2000, 0x800}) 10:44:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5451, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:26 executing program 2: r0 = userfaultfd(0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000140)=""/225) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:26 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0xffffffff00000000, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000004000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x5d6}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x2400, 0x0) r2 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)="7da0892f48326c139c8591096a373076ae5c3d047c34671523b3c8cc80597096dcdda2b999cad80c488b3c6db75d25646d946c311cce14fdd120b8a2e6b8153adfbba25c430bfcc3d70fbb1d0a26867578ebc9316edb3d7ef91f02e042c846be218ff2d6315060e7ac196182abb17ab38c9928d7dd580ce10885bd7f03b2bb0ac29a1dc82e0c01591666954508115343648b2b66a541473c0194e9fa87e4679b954059860020d76bc0c997576b69d952dc88f12c438e922e4e0bb2d67167f911eed1bb13ba08cf1f589dd372097a263aa90e6a6deaba2f0cd6605fea1c1fb84d5e2fe02e0d19d5e50c", 0xe9, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 10:44:26 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4040, 0x4) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000000c0)=0x357, 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00005d6000/0x2000)=nil, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x9}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 637.110630][ T26] audit: type=1800 audit(1549795466.630:55): pid=19541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16777 res=0 [ 637.184040][ T26] audit: type=1800 audit(1549795466.630:56): pid=19543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16777 res=0 10:44:27 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(0xffffffffffffffff, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:27 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0xc028, 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:27 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x10800, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x800, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x10000004000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) r3 = getgid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000340)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0xa1af, 0xa0, 0x4, 0x100, {0x2, 0x800, 0x3, 0xffffffff, 0x3, 0x0, 0x1, 0x3ff, 0xe7, 0x1, 0x9, r2, r3, 0x800, 0x8}}, {0x6, 0x2, 0x5, 0x39bd9ed6, 'fuse\x00'}}]}, 0xb0) 10:44:27 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x4) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:27 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = socket$kcm(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f0000000440)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x4}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000b80)="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", 0x579}], 0x1, &(0x7f0000000800)}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="e49e62e63c9eab9b34274a14d318", 0xe}], 0x1, &(0x7f00000006c0)}, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000140)={r4, 0x63, "8c87f253ccccd5cc1bd6e75f948b17ca377c01a00aa1d8bde0cf6a65d5e6701aded9f0070615f1552a69de3009ca768217664200fa6a83556a9b128ca4f572f8400456421c2c29eb7a28900a4f0496f73143e9554cd190ef24930b07246d4705f640d2"}, &(0x7f00000001c0)=0x6b) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x802, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000140)={0x7, 0x79, 0x1}, 0xfffffffffffffffc) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7fffffff, 0xfffffffffffffffd, 0x1ff, 0x4b43, 0x4}, &(0x7f00000000c0)=0x14) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000004c0)={0x0, 0xc, 0x4, 0x100, {r3, r4/1000+30000}, {0x0, 0x1, 0x1, 0x3, 0xf4, 0x1, "10ce2ee5"}, 0x9, 0x2, @fd=r1, 0x4}) r5 = msgget$private(0x0, 0x8) msgrcv(r5, &(0x7f0000000340)={0x0, ""/152}, 0xa0, 0x3, 0x2000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x5, 0x7, 0x201, 0x80000001, 0x9, 0x9, 0x100000001, 0x400, r2}, &(0x7f0000000200)=0x20) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10d7860000000000000001000000bc97"], 0x3ff) 10:44:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5452, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:27 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7ffb, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xe5, 0x4, 0x800, "4fde3c93f4c7bcd603b50b7bcf3cb394", "8033655e571dcfcc055b267faa8abf03b9a0e07259a4d0a0c44dc6ddfab2a459c4b7f15db7d3352aa89103791ac3da7ec0f58e3c5b539dc8680b2729b552c7f944cd65919341ffe97d59cd4236c5376ea81060c463f089a77e4491f1bdf8ff2a2efe897dff1aa1c1057ab74b70a31519680ea9867338357fe8a76045b644f2205467239223976bb81025c71892851f4434efc193bb9353ab932d1db7dd1c4513e6e375f354fd9bde7a1dfb88313723dffbae9a178001ca73f80f0b8f5ca04f0be47b1ee3df0f430e476f048e16c301c6"}, 0xe5, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040), 0x4) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @remote}], 0x20) 10:44:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:27 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:27 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f000031c000/0x4000)=nil, 0x4000}) 10:44:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(0xffffffffffffffff, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f00000000c0)={0x3}) read$FUSE(r0, &(0x7f0000003000), 0x1221) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x8000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5460, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:28 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw6\x00') getsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='highspeed\x00', 0xa) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000200)={r2, 0x6}, 0x8) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000140)=0x5, 0x4) 10:44:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3cffaaec1e322c7c5c9dbfccc931e9620f464868104ffc22c0c6d15c2bc4fb867af45942954731ea0d0f97147059176af6a8b77fa2ec21b6ddc7592c809d9a90f29bb4858e6ae433f8cd095ef4f9bc71a00613906c2cc5cf76010989f6ccd21053f609368fc8bb509d42522cd8956be214d812354d9105224ce7c31d08031d835646815525c6abe38bd3468b"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) getitimer(0x1, &(0x7f00000000c0)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xfffffffffffffc39) getresgid(&(0x7f0000000140)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) read$FUSE(r0, &(0x7f00000050c0), 0x1000) r4 = geteuid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@allow_other='allow_other'}, {@blksize={'blksize'}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x811}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fuse\x00'}}, {@hash='hash'}]}}) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(0xffffffffffffffff, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:28 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8003, &(0x7f0000000000)=0x3, 0x2, 0x5) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:28 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3fff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:28 executing program 1: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) accept4(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000000c0)=0x80, 0x80000) socket$caif_seqpacket(0x25, 0x5, 0x5) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x2, 0xff, 0x4, 0x100}, 0x14) 10:44:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000140)=r2) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x10201) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:28 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) io_setup(0x7ff, &(0x7f0000000000)=0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10080, 0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f0000000040)="2208276174362d4e83dbb9e5e7cf36b8c36d1c4dd31619", 0x17, 0x81, 0x0, 0x1, r2}, &(0x7f0000000180)) [ 639.533036][ C0] net_ratelimit: 22 callbacks suppressed [ 639.533044][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 639.544628][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(0xffffffffffffffff, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:29 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8040}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="74010000", @ANYRES16=r2, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x80}, 0x48000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000380)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 639.693025][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 639.698837][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:29 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000001c0)) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r2 = msgget$private(0x0, 0x540) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000000)=""/113) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x101000, 0x0) write$P9_RAUTH(r3, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x40, 0x4, 0x3}}, 0x14) 10:44:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="100000000000000004000000000000008efdfe2b3f2f627e183752d4d5199556e6f5fd49484c2d3e38de4f86e7512626167d2a9ab62f866384b5bec570e6de8c2acca487ca255534c90f42bc6a2cc62c568cd5e7fe61fc3d8a0b1b1d3538715f919b388522c30a85db8675284a0682bc25f6e5eccf7bdfadeacfcd943b53da0e2b6db29a4fe6912b1dbbd7a00d48f1e0d7ec5fd1d1ea861922e57115246092116fae272979483a0e6125c843d60e52024acf61a8c47ba9e665f81ff2a69c45a34a9618bdd97d"], 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x208000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000000c0)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000080)='./file0\x00', r2, r3, 0x1000) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000140)=0x1f, &(0x7f0000000280)=0x2) 10:44:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(0xffffffffffffffff, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:29 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x3}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:29 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc44f, 0x100) sendto$netrom(r1, &(0x7f0000000140)="bd89ceb979f54cec12fcf20fe22af8029a2d2acc9f5d142617e2da5803d1cd78959e42f7495fd089e30607d963f15e8a6a062ea1e595382657a43a7e39e25adef90325a5e30a1c55aed4365132d2cab722e0df05a116c9276e70e73badd20e8782", 0x61, 0x40000, &(0x7f00000001c0)={{0x3, @default, 0x2}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default]}, 0x48) r2 = msgget$private(0x0, 0x8) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000340)=""/4096) 10:44:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="af735e1000000000a6b87f8b76640000"], 0x10) 10:44:29 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200040) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000040)=0x7, 0x4) 10:44:29 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) getpeername(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000040)=0x80) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=0x1024) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0x3, 0xa25e}, 0x10) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) fcntl$dupfd(r1, 0x406, r0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f000059b000/0x3000)=nil, 0x3000}) 10:44:30 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0xfffffffffffffffd}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 640.423026][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 640.428844][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 640.434693][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 640.440457][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 640.446252][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 640.452010][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(0xffffffffffffffff, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:30 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = dup2(r0, r0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000)={0xd8, 0x5f3, 0x7, 0x2, 0xe8df, 0x5, 0x3}, 0xc) 10:44:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8902, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:30 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000)) 10:44:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(0xffffffffffffffff, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x11bc) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:30 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) r1 = userfaultfd(0x80000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f00000000c0)=0xe8) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x27c, &(0x7f0000356000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:30 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1, 0x101840) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000100)={0x493, 0x80, 0x40, 0x10000}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x10000) setsockopt$inet_udp_int(r2, 0x11, 0x66, &(0x7f0000000040)=0x4, 0x4) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000883000/0x3000)=nil, 0x3000}) 10:44:31 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xfffffffeffffffff, 0x2, 0x40, 0xfff, 0xa757}, &(0x7f0000000180)=0x14) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xd6e) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r4 = request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='&!*user\x00', 0xfffffffffffffffc) keyctl$revoke(0x3, r4) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000ac0)=0x0) r6 = getpgid(0xffffffffffffffff) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00)=0x0, &(0x7f0000000f40)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000f80)={0x0}, &(0x7f0000000fc0)=0xc) r10 = semget(0x2, 0x3, 0x200) semctl$SETVAL(r10, 0x0, 0x10, &(0x7f0000001300)=0x6) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001000)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001100)=0xe8) getgroups(0x6, &(0x7f0000001140)=[0xee00, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00]) r13 = gettid() getresuid(&(0x7f0000001180)=0x0, &(0x7f00000011c0), &(0x7f0000001200)) r15 = getegid() syz_open_dev$dmmidi(&(0x7f0000001340)='/dev/dmmidi#\x00', 0x0, 0x81) sendmsg$netlink(r3, &(0x7f00000012c0)={&(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000dc0)=[{&(0x7f0000000340)={0x734, 0x20, 0x600, 0x70bd27, 0x25dfdbff, "", [@generic="8bad88e4d273545f83f63c99781f1dbde7e92819b6e5551a63f6a5c6200fa05cccca4432c8f93cbfb99fb0fa0e2895f7396a959ac6515c556d61b7f7dde6548615c9bacd6eb7799adf3aaea547207b211491993e78f54b9e7d5eabe12dfe027c9a320083a478e1a0fd", @generic="c7dcd8b579ca5c38f140f8ec74dca414c8b9b2af5e326c759fe601e77fde608ede280dfa89b66eee79ab348ec18c82094f09698a0312a3d053ad79f7357e75b66fa02d12de8d2a9e209af7602070794109a459680cf29e7eea4caf98cf5d315e51e76f3cc5a92bd9573291eae421e668047393f61bd9cae674e02bb13646bfd871e90d7dc2456163548ff09844f1672047b0069922", @nested={0x148, 0x90, [@typed={0x8, 0x29, @u32=0x40}, @generic="2acd4177a3d0a5126802e3f901a64285e0e574da5306065081b76b1f93583acc5a017f408430fec08ed8a68d3781ed6d264f0a873b8b2f0b5471c8588b167070abd87e7a24f6c1270f20f9e955555c4f2bfcadeaf0facadd0dc9569ed313cc582b8d84cf621593d337487602c65e5de59bd7f6247d2d3c402158e11cb7e89f89f54b0cbccd692c9ae36de6b77067337ec2edb509d30aa29f6cecbbd05f08095b0603e5d60f387309aef30ad350032c", @generic="c14c19892f479c98468544584a19f510f7b2596f75b7f15fe76fea010e49380e7f607b5fd1396262f79cfa290ad8ef5e8ee2725adf6057d9a10c716197a17b864ada86a52cedbed965a06a0a5877457faca3eafca44c468c8ae620fc758c3ced6f265cdd2b2c92", @generic="a478c52fe35c85b70ba60f6db9df2da196dcc30270214c0eaba316dafea9f40e19e0dd"]}, @generic="9707f1c738b8f027e51db80f0cac0923", @nested={0xb0, 0x68, [@generic="01164c0c4d46bcc40f10d5c3925d8cb27c5239b519c69b7f286efd99d25733c014dc78bd4aaa92f6f60d90105bb697234e2f3c6c87dee1fac6d95b623255edc5de60efecb7866d3ca3231164", @generic="1efaf1cddfbd8c8802cf429f3303bfc5dfd121cd2173fb77bc9cbc3c7f486dc436aba8d33905ade226e4a56b0a1cfdab8e91538717e9ea7f71750ab610709430a7808e5ffebbf451e709fe7874986c91d110e3842aa3439398cb6ba825"]}, @nested={0x224, 0x8e, [@typed={0x8, 0x1a, @u32=0x800}, @generic="b7f613060fc0d4dabe850855459335ceec70d00d6f1e39dace2b23b8d153a8cdc07780f18114d12d59018348bbd98a7626839701259ca1a4be377a4b9b9b6cdd1e47eb24c006f5463e2de68b275f534d0d46c67cf456eb97590d7ed17a3a4ac55b0d01148bd05445a1e763e6fff9d5d99e4b68d6e89b7126", @typed={0x4, 0xd}, @generic="f1db0dd9dcb1504b4a6d79af38b03db54988759c41d21f5b3a18b8a2f9611daa7ba818f19ea038b8ddf49e5837310d4e2cf7b490066eda7d09518c227a", @typed={0x94, 0x16, @binary="1ede61c58670799d8cad8373350ef3685a95fd094bc49c999dd678a4d1442d73da3564b22d6a6d84535d9bcd4ac08b5566962e0e0daa1edf4e566a74a1dc61edb11a580aa30ae9deb2aee39637b8ed142e43497219e07fd07b4ab16e9358f8d5bb7f50e692ec1f29a59f8130eba6d52fc36d1022e745991731fa25ea71f878980ab1768147647fbb7622896c42"}, @generic="bac625f41d8b33af9aca2fcbe025dd61a05ab7f623a4b1327322f7fbeef0c10e928e724ef3a1aa7ed311f21e49ef9d5d8949d0ec224970d5b3533de75b1f98765f5c1f300c0cc563b908823e8f62dc5247ca38b28bf92d213187f365629c30972fc66d", @generic="ce545b7d69633c6fe869a05665b3bf", @generic="108a3f6bbf1759303141efc662f6cd97987d7a6331c196f6389c35300c0b8a7b6abfa39918cdbbe90f9771e4fa9b2ea42ffb30d4d3f7a2b2390c01382a0b56ac71a1dd825e8c5cd3", @typed={0x8, 0x68, @fd=r0}, @generic="d51e2dbcbe0b867151"]}, @typed={0x8, 0x95, @ipv4=@local}, @nested={0x1f0, 0x10, [@generic="7affe90bcf3fb849b773263b85ec8e70308e1db886421b3f3e407f77cfff7801f2d38bd49412576501dabd82001e89f39ed8214b380af4d20a33f76bb3d57967e7922a9097eb944568b54e5c8db9b5ccbca4746d91", @typed={0x8, 0x46, @u32=0x400}, @typed={0x8, 0x70, @u32=0x6}, @typed={0x14, 0x88, @ipv6=@ipv4={[], [], @broadcast}}, @generic="e2989d56a06b36d622822a20f4ba0ef1738729aa6b4829a439eb9819487167a57a9fbb9fff133383e021f316a404e0f2305055d72a6e2834f712d79538b90574c70435ca1b2ba87cd027b0c1db41d11fbb8b9824b2ad3c80fdf1a96e6d511a7ab2c48256d9f4d6c73ee2b442f04594646b1b370783a7200f275a03a0203f49c5c605d955e0695079e44f4a80a8d821bc112ef7187a5d98970ddd9bdc624e7c224ae7285b902cfaf2ec2415af87ed8d2f361dfeed749127e14c8c2c1558175eae1d2907de252a1e78aab4275759aaa9", @generic="4c77dd85ac7662da38ce86324dd76d1bf6b4f672d206d18c0521974d12276de21af69fbaa63fe9a003ba23563ac892163f02683411b2f100905ce42147085d55e690f74ae90ae715a0740f9217973b44744bf3db1dddf777d3f339e1e7c7019ad0c7abc477ed8b63608279815628bc6902e0d158905abbea783a316850353b34092fd9ea8004fa3a8aec30c3aa7276203e589c1af64c0b3d5d6985c6824bbca28be5"]}]}, 0x734}, {&(0x7f0000000a80)={0x28, 0x1c, 0x0, 0x70bd25, 0x25dfdbff, "", [@typed={0x14, 0x23, @ipv6=@remote}, @typed={0x4, 0x41}]}, 0x28}, {&(0x7f0000000b00)={0x2b4, 0x18, 0x611, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x2a4, 0x60, [@typed={0x8, 0x75, @ipv4=@remote}, @generic="718b2f273c1f9c9e60255cf662dcf425a138d035b01386495b059a983fe5b341762d4d05bc81fd6ba1224416f513e9de4f4af73a3f45a95cb365d64b09d932ededd2253db29f5844a35a29dc4ebc0ca9d66763838b2076d6db1aa2a687a4eeda", @typed={0x8, 0x70, @fd=r3}, @typed={0x8, 0x7a, @u32=0x5}, @generic="32cdd88ba99b10c1a386255a7fa73eb51ef99fcaaaa0c6be2f38a456a5dbed6bfcea77418af881296c9038d0eaeae4796d1c567877b23c", @typed={0xf4, 0xf, @binary="5d920205ff998cdfa725d6ff5f496945e6613719cf5f5107fbe359cd4b8339d4a4617129976a93fb3be83cf7ae70f52dc795fa5eb294f50a6443bb897d35096e05ae9a7f6dfbc496233f62444c456c37d60b78ece9c8bf4afd387ac373d819adc31c813164ca289d379bf9e2f327c87603b12febbf75e6080d2981f939a2c5133df1bc747415b3e9fad0b30d107f765e7b7f65ca57d1b4157a9012298c77b3bbd7025dccda368a5dac7cf87368b4cef48609d04f126590cc882a208430976b4cccb09d94bad2c317997f86c3f9baaf9588b46983f3851aa9b827996a11bfd6f0636debbe86bda3b6a70c978f86c3b46c"}, @typed={0x8, 0x47, @pid=r5}, @typed={0xc, 0x40, @u64=0x7}, @generic="8619321106c20abce06625b9d334c5ac5d44584cde93cdcff6772f46bed023d9d9b581ce407eea3df6cf13d90d6cd51fc4d6585f2965a68e66a6ef828b8f7b7b38ac475cda8fd6a0344a3d2d9bbcf3d2f8355d31e48196b7f8c713c015fd21235b973e04d574b5d22568dfbba3d1a27e272476676d3ee1a29b59dcf566bf25e9a8cb9744d7bc36278abeed0b95f194f151b3dbb66e20ef53a8e0793a2e", @generic="10a60781920ba79a8136fd361d54cfe68d38294c649b26aa552a1cfa94cff9186c744de55c0f0293e28375868ec0a52572ed5c81c347607ce39939d54f4211dd198c83273a360e67a3"]}]}, 0x2b4}], 0x3, &(0x7f0000001240)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x20, 0x1, 0x1, [r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r9, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x80, 0x40011}, 0x8815) 10:44:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(0xffffffffffffffff, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:31 executing program 1: r0 = userfaultfd(0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x210200, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0xcb}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f00005f3000/0x1000)=nil, 0x1000}, 0x3}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000140)={r3, r2, 0x100000000}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x5) openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x80440, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:31 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7f, 0x400000) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv6_delroute={0x34, 0x19, 0xf06, 0x70bd27, 0x25dfdbfd, {0xa, 0x20, 0x0, 0x0, 0x0, 0x3, 0xfd, 0xf, 0x500}, [@RTA_UID={0x8, 0x19, r2}, @RTA_UID={0x8, 0x19, r3}, @RTA_UID={0x8, 0x19, r4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004085) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:31 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x10}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:31 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x42, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000140)=r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0xfffffffffffffff5, 0x2}, 0x10) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) r5 = gettid() r6 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000800)=0xc) r10 = geteuid() r11 = getgid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001080)=0x0) r13 = getuid() r14 = getgid() sendmsg$netlink(r1, &(0x7f0000001180)={&(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)=[{&(0x7f00000004c0)={0x1f0, 0x2e, 0x800, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x1d4, 0x1a, [@generic="696f3b53de454234d9227fbd1ab80f75606084ae60745125618870b7b020461a4a62582ffed2176a6eefb342802d54cc594b0d333052434ade85866117dedc97da55631fdf0f1698533615b2305979866b19075a529b17", @typed={0x8, 0x1a, @pid=r3}, @typed={0x8, 0x4f, @pid=r4}, @generic="3fcd8450c75ce2476a0ac3f51e2af2", @generic="c44aa03952278bc1fceae3ecba17bac33c643194a90032985cbac03648ac3ce3f61193f7f99e093b7c1efeba4d4ef7a7022e868e26ad8412a03bab107b5315c33c94169c5de7a044da44727f0009d9e6bfe8b6424853635c", @generic="1b1686c895ef868e82b0f2b81fadfed1e4627ecab44cd8130ee41295189f02e263e6313717590a207280950fe84dec6fb508f6078c7e40860081991742605c1781f230a164843da114a926bd703a82a329f1cf7540b1055222f9e08f81d01c7ad5b8593679ae1bf730b5404a07f3d9c9ea48390506e90f7eb32e291136a07d26ce83fa1cbc1e74", @typed={0x10, 0x80, @binary="08d423f30cfa7a6c06b70f2b"}, @generic="56aa76e3096a9707f774718b19c2c54afc4a524268815793a43b31965dacb5e365930354928c57153761bacd47837489ec3fb0808b6b5d537fe1349d8930b245ca63f4be3501855bda92a58c04c5aa59dec17ca3bf", @typed={0x14, 0x76, @ipv6=@rand_addr="27259a5069fc22201e694c04f67b64a2"}]}, @typed={0xc, 0x13, @u64=0x800}]}, 0x1f0}, {&(0x7f0000000880)={0x228, 0x21, 0x0, 0x5, 0x25dfdbfd, "", [@typed={0xc, 0x72, @str='fuse\x00'}, @typed={0x8, 0x68, @str='fd'}, @nested={0xec, 0x32, [@generic="de96a05e3655599c7e48322f2d22c971cc8c603a658f62c9c50e92d85fa89a8ab54984cfd890b181ed519d6de9ce5d74eb1d463cd33303e094324d983eb0cf703f3927663dea8000ce1e96ebc3ab37b8758985faa2bdce1caaa5cb04a02ede51569dee590909d0e651c17a8217430b133c4dab154eeeb5e0bc72991a766ed4f36827c918b5c3dd32d4c111ec987080ca1b2a51a17d6c901fd0b1cf7fd260021d2861b5f5e76deb12b7c607b5a9802ef89158b944519c947fdbdf9f95b1325e5ab46a09a3b101cf", @generic="da5122a6724a4971e33e1cf1e33c8f4625435a070925ac86cd5608d47d20cc"]}, @generic="5b13a1acc8b7476601000e01127bb08ac316e084a2666c694d1489f01edb7e25ddb3d4", @generic="a48570cc6ef99f60ab18616439237cedffe1d07478b0b634c49ace673518ca3c4a0669f0d211de05d3909d8a33e1b28c31ef6391a33d63385b3f68b4f08076915c2046cc6c501c48f34e44f924e5d46dba3b3aecc5c2f6738f143da535c861d5501c821b3f71637790fe7d34ff2a8761b671297b3f660000e4f09dda7addc88c1ad5132f2fe3eae3ede1ceeec62a40ff34bb38856304905bca92441c5d4d706bc9374c7a1126434d23b36b8de5c1fce5eb469b66d3f63aa92623093b1f9d0b35f574000480b1399ca80a036770d53f08a7e5c378cb76e21b4aebedb3e6caa24f46ae801da0603ac7bc8b8e1841c8d16207b1"]}, 0x228}, {&(0x7f00000006c0)={0x118, 0x31, 0x203, 0x70bd2d, 0x25dfdbfc, "", [@nested={0x108, 0x4e, [@generic="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", @generic, @typed={0x8, 0x73, @u32=0x7}]}]}, 0x118}, {&(0x7f0000000ac0)={0x498, 0x24, 0x804, 0x70bd26, 0x25dfdbfd, "", [@nested={0x54, 0x77, [@generic="1cc1bb9b605ee59a084b4468d985ab31e8df70167794424e6cbe94221a56f2f0fa275cec0e197e457b339591830400bc5b787abe011a48", @typed={0x10, 0x75, @str='/dev/hwrng\x00'}, @typed={0x8, 0x25, @ipv4=@local}]}, @nested={0x18c, 0x31, [@typed={0x8, 0x7a, @fd=r0}, @typed={0x8, 0x1e, @u32=0x1ff}, @generic="c41924b474b846904ec461770bbbf814dfa961da67c12138602c572f42ae728b354be2aab55827f6f244df39a93d427af69091a82e9273a54af5e8f3f17e0db80cd242bf20eddda6322dff6df8018da21714f12fe57e139171f477394438af1fd8acbaf6ceaf2ccb9a1f97758b32137776d04a34a8f7708f15478bfa53be3971f515b0", @generic="7731c3fce32cf0724e96e99ad20a988da5f139823c99c6f31ad423ccf16e7eeea96fb2e2c7240155855ceea3318d90724545469377d59d280ee21144a51ad845ebcd75b66cb6ab0a87c75f0817a7cbf640e5a239ebaa555f05d73b0587db8d177c9cbe17402116a35db0518eccd279c99a20cd292e7540e0fdb42e63277a8baf51c7c0f28a2718e1eaf7224ebe5010485194297164cec2c4d2e8073769f40b65c4a10711b95dd77e6338850cc4e94cc40384565d0603a75d28a03ec9d1af0a917b327586eb5f94138db6b345079406b056b169d0bfdd9d80c662f0c24cce663af15e1ab26ffb6bd0383fc9fdfe0e8d69d7de66"]}, @generic="469a5e6bbca4ecb664ff1eb20c7b53480b25dfc5184e63a8b307ff8127f5d647ae5d94ef8713ffa0e48d568f640b559f09de24e1caa1cf2ab82d3edd1974882e942985a62704abc8c358ca014128a56c3dac167330fd2d6b26aa8842aa7aed276ef47bbf9b94aafa3d9a80953117311fe17221c1729c646c759662c005979ceb53fe82cdc7c922", @generic="872f43e77f20663a0859a13d7da6c006e2e75943f78ae4745964b5246906bacf5445202a4af5bd830f45f9425b96d858acba701bbb6b495229d13ab9d002b3e5453cf5f46efcef76e7631b85b8533dcf6bf4efc2f5e101bd9752cfd8f97b4c4c40a475ca48ca999595a50c519db4908773528b72e2b2aadd5b6e8aaba8b466b560c92346f115c5881454fb4e4c1a49d8a468a7f56e45c719ddeb975b0d839590ad32af2663ce483c00ab037842e41ef71ec884db4499d8b8fefd8d84989ddae4f8d9fdb0e91461a8a0fc76723953c034e8e049cd23f82a761d0b89e10d375f9ddc4b3f8da6", @generic="8b645a6e9e4388e38cb9186db0f812fc47448e640ae25a1e0514a3ccbc9e40d85b7071f857b281672acec2babc1d48741d199d475755ecacd4579dc5f9a2956b3bb86ccdcb34fdfbb4f77f0cd49f55c35b4a4b801de9ad54f56ad1b13dd20ea6037a60068c49cb4d0613662369afdded2b16c7420044028f972be77aea0ec3ecb4b9a08d2809c49ee16916d9990b8e6c7d9cdc7546a81954287b6344d0b9310d16e07a4e95f5786939b727294a9972ed29531ecdfd56abc40b19ee9255", @nested={0x10, 0x84, [@typed={0x4, 0xb}, @typed={0x8, 0x92, @pid=r5}]}, @nested={0x6c, 0x15, [@typed={0x68, 0x5e, @binary="299e53dee6f55b9c152f1e0a3c355aec89c03f5e1f034015d5553b2dac1278590e82d0df72f0c46e0dbad637dd11e65d8fc21099fb1e892cfb50c8c67f83751dc11b0b4c696cf66727f9c95fe74e16cab27e0074ee7fd18bec6897102bd74d17c808cf"}]}]}, 0x498}], 0x4, &(0x7f00000010c0)=[@rights={0x30, 0x1, 0x1, [r2, r1, r0, r2, r0, r2, r2, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}], 0xc0}, 0x20008800) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8903, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:32 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, 0x0, &(0x7f0000dbd000), 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:32 executing program 2: r0 = userfaultfd(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = dup2(r0, r0) write$USERIO_CMD_REGISTER(r1, &(0x7f00000000c0)={0x0, 0x8}, 0x2) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x3) 10:44:32 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0xffff) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:32 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x200) r2 = getpgid(0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x9000040}, 0xc, &(0x7f00000000c0)={&(0x7f0000001500)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="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"], 0x1130}, 0x1, 0x0, 0x0, 0x4}, 0x4c001) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:32 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:32 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) fstatfs(r0, &(0x7f0000000140)=""/156) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40000) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000200)}, &(0x7f0000000240), 0x40}, 0x20) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1107000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nlmon0\x00', 0x1210}) 10:44:32 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00006c1000/0x2000)=nil, 0x2000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:32 executing program 3: r0 = dup(0xffffffffffffff9c) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:32 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xa, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0x3b028fb06411ad30, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)='./cgroup.net/syz0\x00e\xf8\x81I\xacno\x00ow\xd77U\xa2\x17%\xd6l\x85i\xe6\x1a\xa9Z\xe5(#8\n\x86\x95\x16]\xf7\xaef\xab\xd5\xd4\xe8\x8b\xf6B\xfb\aT\x88%gQ\x8d\x00\x87[\xfa*\xc2!\x1c-\x91P\xc3\xfd\xa8\x87\x05D\xeb\xef\x1d\x16\x0f8\xe5e,\xf4iL\xd0\x9f\xcc\x94\xd9\x1b\xd2=\xba\x05\xe8-+>\x87\r:\xda\x81\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8410}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="01082abd7000fddbdf251100000008000000000400000c1f01000800d1007369700024000300080003000000f96c1bb5c200001400060000000000000000000000000000000800080005000002080006000104000002000000004edc1861ff00000000010800050000040003000000080009000100000014000100"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffe) ioctl(r3, 0x6, &(0x7f00000006c0)=' \\\b\a\x001_\a\x00\x00\x00') setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x9000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0xfffffffffffffffe, 0xa, 0x2, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x8, 0x4, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x10000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) connect$x25(r2, &(0x7f0000000540)={0x9, @null=' \x00'}, 0x12) r6 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000180)={0x0, @remote}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000400), &(0x7f0000000140)=0xfffffffffffffc8d) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40485404, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3}}) clock_adjtime(0x4, &(0x7f00000009c0)={0x7, 0x100000000, 0x7, 0x81, 0x9, 0x1, 0x0, 0x1f, 0x40, 0x7, 0x1, 0x3, 0xff, 0x1, 0x4e19, 0xfff, 0xcf, 0x9, 0x80000001, 0x5, 0xfffffffffffffff9, 0x3f, 0x2, 0x2, 0x3, 0x366}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000640), &(0x7f0000000680)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x10, 0x20000000080003, 0xc) socket$alg(0x26, 0x5, 0x0) write(r7, &(0x7f00000004c0)="1f0000000102ffff000200000000000046259d1738be1300f30501000b000600000423ca310000", 0x27) 10:44:32 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x2, 0x2) openat$cgroup_subtree(r0, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = userfaultfd(0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x200400, 0x0) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000300)=0x1000, &(0x7f0000000340)=0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x880, 0x0) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000140)={0x18, 0x1, 0x0, {0x100000000}}, 0x18) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x800000000}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x4}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYBLOB="ffc31a00020009000300060000000600090400000000000000c4d9d44df8a7113064eb9601b9bf0695a7e56cfcd1798149fe41886e0bd4e31e8c66077d7950be97c0e2d50a955774f6a4408ef5c28a27279d3d7440ad425ae7e648e6153b1615e401782243264a45a78270a11eb78a162735fe048550f34d9576428a97d738322b4f7682ce26ca2aa8c43bb4f787307aaf3c35387058350e0d2ec6b3dd2791835fabbf089b48794c"], &(0x7f0000000280)=0x1a) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9b, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x4e25, 0x5, @loopback, 0x7fff}, 0x1c) [ 643.306026][T19830] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 10:44:32 executing program 2: r0 = userfaultfd(0x6) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x9, 0x0, 'client1\x00', 0xffffffff80000000, "8a1b749479d2388f", "0f84b911fd8ce6b2acce0f59d0af60d9e5ed5ccfa06485fd21fbecaf45ab1b71", 0x2, 0x8000}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) sysinfo(&(0x7f0000000040)=""/4) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, 0x0, &(0x7f0000dbd000), 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8904, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:33 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x43}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x414000c0}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r2, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}]}, 0x20}}, 0x4000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 10:44:33 executing program 2: r0 = userfaultfd(0x4000000000000800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:33 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 10:44:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 10:44:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@loopback}, 0x14) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x17\x000\xdf\xaa_(\x8a\x8c\x9a\x8e\x00\x00\x00\x01\x00'}}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x7fe, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) 10:44:33 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400200, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'hsr0\x00', 0x4}, 0x18) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x76}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000185000/0x1000)=nil, 0x1000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, 0x0, &(0x7f0000dbd000), 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:33 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x800) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8906, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:34 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) accept4$netrom(r1, &(0x7f0000000140)={{0x3, @bcast}, [@netrom, @netrom, @null, @bcast, @rose, @netrom, @default, @rose]}, &(0x7f0000000040)=0x48, 0x80800) 10:44:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@loopback}, 0x14) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x17\x000\xdf\xaa_(\x8a\x8c\x9a\x8e\x00\x00\x00\x01\x00'}}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x7fe, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) 10:44:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000300)='fuse\x00', 0x80a0, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRES64=r0, @ANYPTR64, @ANYRESDEC=r0, @ANYBLOB="07fee414aa9ad56d1f3c14b569809a3abed5bd38a93e91de8c0f630e68012419e9e9fcf6fc22b973f630e14bd4f1bec00fd53f5727941d96e1d10d52144502263b6f1887", @ANYRESHEX=r0, @ANYRESOCT], @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES16=r0], @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYRESDEC=0x0, @ANYRES16=r0], @ANYRES16=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x1000) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 644.573060][ C0] net_ratelimit: 18 callbacks suppressed [ 644.573067][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 644.584560][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 644.590391][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 644.596200][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 644.602013][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 644.607830][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 644.653018][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 644.658862][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:34 executing program 1: r0 = userfaultfd(0x80000) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x280000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000273000/0x3000)=nil, 0x3000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x40010001, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040001,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c89f05c719a6707"]) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x800}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x5a}, &(0x7f00000001c0)=0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) linkat(r1, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x400) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000340)={0x2, 0x0, [{0xfffffffffffffff7, 0x7, 0x0, 0x0, @msi={0x0, 0x1, 0x7fffffff}}, {0x8000, 0x4, 0x0, 0x0, @sint={0x400, 0x3}}]}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:34 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) getpeername$tipc(r1, &(0x7f0000000040)=@id, &(0x7f00000000c0)=0x10) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:34 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x1) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000140)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, 0x0, 0x0) dup2(r0, r2) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, 0x0) 10:44:34 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x5, &(0x7f0000000580)=[{&(0x7f0000000880)="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", 0x1000}, {&(0x7f00000001c0)="62152ebc615bbb2eccf1264fa94be205a65739765679fac8f662eb17e10ed71dc907faa3c6a1d9547b7760f6967917bc8afca8d6ae09b713729bdef93e313544e55b5f23ee4ab48b706330c289059215e4c9b0b4c067310bc4532a5a7ef89a8a5f903e08e16fbda2a4d25e04232562dfa5ca7334ce678e45", 0x78, 0x1}, {&(0x7f0000000280)="d2df61b9ec461ce6723908782d38e62b047f6c759104970b08c7e290734da7faf351106f5c0ca0a0d0266c5587edd5c8a6d8a6cdd2781de5a8e694edb96f33b37479f44b", 0x44, 0x3b}, {&(0x7f0000000340)="32cf578cd860fbed97f6de51215cae97bf90f91d5a50ec02719fec0607c27e4fc7fe18574e3e6982e84a94071197d55d8db35828147ff4e77efa2a7040e59b5c2e45a12f699d", 0x46, 0x80}, {&(0x7f00000004c0)="d58f4dac89ed61166d5c132c50e5787a52dc6c94a29da5e9d8b42936642e5851a6d74cbd85950bc2bac6b13b09a1e7c450375813b394672f1b543b294b3039dabc6170d16ef53f08bab0d060c71c0e819df0ec73c0b87c443c2bcab78a86e3998d18f72281a362fb434011a8855e7601077d7b78de072a454d33b46286ad8e8e61c6db1567b479", 0x87}], 0x800000, &(0x7f0000000600)={[{@uni_xlateno='uni_xlate=0'}, {@shortname_mixed='shortname=mixed'}, {@shortname_winnt='shortname=winnt'}], [{@smackfshat={'smackfshat', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '[+]em1*'}}]}) 10:44:34 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, 0x0, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8907, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:34 executing program 2: r0 = userfaultfd(0x80000) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) accept4$bt_l2cap(r1, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x80800) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x1) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x400}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x8000}, 0xffffffffffffffc8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000200)=0x3cc7) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:34 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/9, 0x9) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="911ed5000300"], &(0x7f00000000c0)=0xa) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x10000}, &(0x7f0000000180)=0x8) 10:44:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 10:44:34 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000153000/0x2000)=nil, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x801) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x7fffffff) 10:44:34 executing program 2: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x7f) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000100)={{0x7, 0x698}, {0x1000, 0xfffffffffffffff9}, 0x7ff, 0x2, 0x6}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x6, 0x9, 0x80000000, 0x4, 0x8}, 0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000000)) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:35 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x800}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000180)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) clock_gettime(0x0, &(0x7f000000a6c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f000000a480)=[{{&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)=""/254, 0xfe}], 0x1, &(0x7f0000000280)=""/80, 0x50}, 0x4}, {{&(0x7f0000000440)=@nfc, 0x80, &(0x7f0000001900)=[{&(0x7f00000004c0)=""/217, 0xd9}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/1, 0x1}, {&(0x7f0000001600)=""/215, 0xd7}, {&(0x7f0000001700)=""/72, 0x48}, {&(0x7f0000001780)=""/109, 0x6d}, {&(0x7f0000001800)=""/169, 0xa9}, {&(0x7f00000018c0)=""/7, 0x7}], 0x8, &(0x7f0000001980)=""/124, 0x7c}, 0x6}, {{&(0x7f0000001a00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/87, 0x57}], 0x1, &(0x7f0000001b40)=""/252, 0xfc}, 0x9}, {{&(0x7f0000001c40)=@nl=@proc, 0x80, &(0x7f0000006040)=[{&(0x7f0000001cc0)=""/174, 0xae}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/166, 0xa6}, {&(0x7f0000002e40)=""/4096, 0x1000}, {&(0x7f0000003e40)=""/183, 0xb7}, {&(0x7f0000003f00)=""/4096, 0x1000}, {&(0x7f0000004f00)=""/62, 0x3e}, {&(0x7f0000004f40)=""/138, 0x8a}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/58, 0x3a}], 0xa, &(0x7f0000006100)=""/189, 0xbd}, 0x40}, {{&(0x7f00000061c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000007440)=[{&(0x7f0000006240)=""/26, 0x1a}, {&(0x7f0000006280)=""/116, 0x74}, {&(0x7f0000006300)=""/216, 0xd8}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/11, 0xb}], 0x5, &(0x7f00000074c0)=""/245, 0xf5}, 0x9}, {{0x0, 0x0, &(0x7f0000008900)=[{&(0x7f00000075c0)=""/64, 0x40}, {&(0x7f0000007600)=""/175, 0xaf}, {&(0x7f00000076c0)=""/95, 0x5f}, {&(0x7f0000007740)=""/102, 0x66}, {&(0x7f00000077c0)=""/32, 0x20}, {&(0x7f0000007800)=""/76, 0x4c}, {&(0x7f0000007880)=""/4096, 0x1000}, {&(0x7f0000008880)=""/112, 0x70}], 0x8, &(0x7f0000008980)=""/202, 0xca}, 0x100}, {{&(0x7f0000008a80)=@l2, 0x80, &(0x7f0000009dc0)=[{&(0x7f0000008b00)=""/206, 0xce}, {&(0x7f0000008c00)=""/154, 0x9a}, {&(0x7f0000008cc0)=""/4096, 0x1000}, {&(0x7f0000009cc0)=""/252, 0xfc}], 0x4}, 0x2}, {{0x0, 0x0, &(0x7f000000a0c0)=[{&(0x7f0000009e00)=""/132, 0x84}, {&(0x7f0000009ec0)=""/198, 0xc6}, {&(0x7f0000009fc0)=""/248, 0xf8}], 0x3, &(0x7f000000a100)=""/165, 0xa5}, 0x9e}, {{&(0x7f000000a1c0)=@rc, 0x80, &(0x7f000000a340)=[{&(0x7f000000a240)=""/244, 0xf4}], 0x1, &(0x7f000000a380)=""/228, 0xe4}, 0x7}], 0x9, 0x12100, &(0x7f000000a700)={r1, r2+30000000}) bind$bt_l2cap(r3, &(0x7f000000a740)={0x1f, 0x9, {0xf3a3, 0x9, 0x9, 0x4, 0x9, 0x6}, 0x6, 0x8}, 0xe) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) r6 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000140)={r5, 0x80000, r6}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:35 executing program 1: r0 = userfaultfd(0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2041, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)={0x1, "9b"}, 0x2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) setsockopt$ax25_int(r1, 0x101, 0x0, &(0x7f00000000c0)=0x7f, 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) prctl$PR_GET_KEEPCAPS(0x7) get_mempolicy(0x0, 0x0, 0x6, &(0x7f00007a8000/0x3000)=nil, 0xffffffffffffffff) 10:44:35 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x20000000000000}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000445000/0x1000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:35 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000823000/0x1000)=nil, 0x1000}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000040)={0x4, 0xdc41d9e88017c870, 0x40, 0x4, 0x6}) [ 645.773012][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 645.778829][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x200000, 0x100) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x8, 0x6, [0x3c, 0x20, 0x8, 0x9, 0xdfc, 0x43]}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0xfffffffffffffffc, 0x8000, 0x800, 0x80040, 0x10000, 0x2, 0x401, r1}, &(0x7f0000000340)=0x20) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030302030303030303030303030ff30303034303030ee302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000000880), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x46d) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x20082, 0x0) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000140)={0x2, 0x1, [{0x3, 0x0, 0x79}, {0xf6, 0x0, 0x5}]}) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) splice(r2, &(0x7f0000000380), r2, &(0x7f00000003c0), 0x7, 0x3) eventfd2(0x0, 0x80001) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:35 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000a00000000000000ff010000000000000000000000000001000000000016000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000a00000000000000fe800000000000000000000000000000728ddd09d71d179a34b7630e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x104) 10:44:35 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x90000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xf2a4, 0x30, 0x9, 0x6}, &(0x7f00000000c0)=0x18) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000340)={0xa, @win={{0x3, 0xdee3, 0x0, 0x1f}, 0x2, 0x8, &(0x7f00000001c0)={{0x7, 0x4, 0x4, 0x3}}, 0x7f, &(0x7f0000000200)="5a074474da8970f0ea", 0x7}}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x1}, &(0x7f0000000180)=0x8) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, 0x0, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890b, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:35 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video1\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000340), 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socket$l2tp(0x18, 0x1, 0x1) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x1) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$KDMKTONE(r2, 0x4b30, 0x100000001) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x30c, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20004844) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000340)=0x80000000000000) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000380)={0x2, 0x0, 0x1ff, 0x4}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x210101, 0x0) getpeername$unix(r4, &(0x7f0000000140), 0xffffffffffffffff) 10:44:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x7fff, &(0x7f0000000080)) 10:44:35 executing program 3: syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x1, 0x2) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) sync_file_range(r1, 0x3, 0x5, 0x7) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x7, 0x2) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f0000000280)=[0x0, 0x4], 0x2) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f00000002c0)=0x9) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x5) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "146fec79bb59274d"}, 0x9, 0x3) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) 10:44:35 executing program 2: r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:35 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfffffffffffffff8, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='JV']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) ioctl(r1, 0x7fffffff, &(0x7f00000001c0)="5774c61e2581dff4b5ec643f3acf47a477213498e4191dae3d77ff4c6396cc747be59b6acf8e8cd0e98a86e6c1c3832bdee4d6bf3fe88cf20be8761bc45e4ae46e3de6ba5499c1ed8b8acfa2721baa216e0c3619c58220153efc0fcb0fdddb") ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000280)=0x1d) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x3) chdir(&(0x7f0000000480)='./file0\x00') ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000140)={0x6}) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000002c0)) 10:44:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) delete_module(&(0x7f0000000040)='rootmode', 0x800) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:36 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) prctl$PR_GET_KEEPCAPS(0x7) 10:44:36 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000428000/0x14000)=nil, 0x14000}}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) getpgrp(0x0) getpgid(0x0) getpid() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001640)=ANY=[], 0xf5aab446) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) 10:44:36 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000763000/0x13000)=nil, 0x13000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:36 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, 0x0, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x10) 10:44:36 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x80000000000000) r1 = msgget(0x0, 0x428) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000340)=""/4096) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890c, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:36 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000a07000/0x1000)=nil, 0x1000}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f00000000c0)={0x8a4e, 0x9, 0x800, 0x9}) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000140)=""/162) 10:44:36 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x1) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:36 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$CAPI_INSTALLED(r1, 0x80024322) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:37 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:37 executing program 5: socket$unix(0x1, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r2}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) fsync(r0) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r2, 0x201, &(0x7f0000000240)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$int_in(r3, 0x5452, &(0x7f0000000580)=0xe2e) fcntl$lock(r1, 0x7, &(0x7f0000000380)={0x802000001, 0x0, 0x5, 0xffffffff80000000, r2}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0x10) ptrace$setregset(0x4205, r2, 0x3, 0x0) io_setup(0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) io_setup(0x8, &(0x7f0000000300)=0x0) io_cancel(r5, 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r6 = open(&(0x7f0000000400)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r4, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 10:44:37 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:37 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) socket$isdn(0x22, 0x3, 0x26) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:37 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x801, 0x0) r1 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r1, &(0x7f0000177ff4), 0xc) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r3, 0x79, 0x8000020, r4, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000003c0)={r5, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r6, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8910, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:37 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x30}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) fcntl$setlease(r0, 0x400, 0x0) 10:44:37 executing program 5: socket$unix(0x1, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r2}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) fsync(r0) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r2, 0x201, &(0x7f0000000240)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$int_in(r3, 0x5452, &(0x7f0000000580)=0xe2e) fcntl$lock(r1, 0x7, &(0x7f0000000380)={0x802000001, 0x0, 0x5, 0xffffffff80000000, r2}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0x10) ptrace$setregset(0x4205, r2, 0x3, 0x0) io_setup(0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) io_setup(0x8, &(0x7f0000000300)=0x0) io_cancel(r5, 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r6 = open(&(0x7f0000000400)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r4, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 10:44:37 executing program 1: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000002c0)={@local, r2}, 0x14) r3 = add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="2176a8651f9a8b03ab8b8e5f18bbc5d84d7059b0e7114af02c2107802caf4214fe59c31ac43fda4e8c7a24a5ed5120abbc7a7afee0a0aeaa6f1626d453afc65cba83af50ae6760ae907f0d2960fbca3f1a821c7c7bfb051d68e8295a2ce80eda49c383ff507e583a8d14c49f0925a35b6f97a8929ca388b3ba012059ee6fab69bf0c305b5934b49d952b90d5f9171b995f1ade3c39af4ea5ec3512c7eaff009f2315fff6c457", 0xa6, 0xfffffffffffffff8) keyctl$clear(0x7, r3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:37 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa0100, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000040)={0x7c9, 0x168, 0xeb, &(0x7f0000000140)="3c867bd3c00db85f3352a9e7dca9fd01d379be2a0b660b1197e9e29501d268f4924c4c0c44a4ee9b9a466d2d52a9612a245238bacd78de7afcd5e16211f7e7104bc21b11b11951f5bb799f824b5d05b4b0bdb30e9da7a70440ccf3555a48fd5daf74716cfd7009d8de479382854ba9d8d865d8688d9db457dcc8a87c5d00b3186dc820c70a81e08febf87086400d14512bdbec384ad9fa3d1de76879e5861c86c1b5f70ad7a3fbe2f592d812039a21b7e7943de91c733eb1cc29200b041f48e2925ef9579a727db6069a3993af6c2375b31f31b8956cbf5f43b60fe0cb4b18387feabae63ca2b3d7a99853"}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:37 executing program 2: r0 = userfaultfd(0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x20000) mq_notify(r1, &(0x7f00000000c0)={0x0, 0x19, 0x0, @thr={&(0x7f0000000140)="567f2176ef8407dce3ad4b66517bfff83d5b4625fbb8ddaa873aa790a5587b83edd70ba2418c0522e79f62116ee562bc6098d88477aa863dcd08e140a8677e85c350febc0cb7ac6da128168da7aa2fd77e6b968eb24588e94e1b46a162ebd988445495a843bd0c542ad679fb83fac38d0c3035dca450efbada50178e9438b26ae0664aad09af5a068ba2b3c0c577156676ca363f4def473b57cd7ec7e6d583c77a4dfee4b904597b86d55481ea96481d7977dfa1b93a48a5f3e3fcb26a8fbc144aba67f7c45a0503c84a7cdeab1085", &(0x7f0000000340)="85c81fb7313138da43282c6522b1ee5733c2b7926bb115dd130bbef48612cf957868cae53ab89824df39d473857fb121f545c1dc3c3af3fda9a34d457de34a1828baa077a7758b4b507d12587ac5307cb64c52ef8d4afe6a5c94ac30df10f2067a1f92cf6fc107d302dbbbbbd10c013e933416e7eaab9e134a782c36060073ced9b3f4a98a319bd1d9db135857b5339fe5eea501c368899a4cc49475e8c6758a628173960f233f62386608aa01b96908240686b7f9a9dd7cef86954619ea63f845f9b423fb69cd9ff75c7d62950a04bc4ed48234cfa09dfa1a3202d0a344fefc90b075a7cfffcebdd44006"}}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80002, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) 10:44:37 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = dup3(r0, r0, 0x80000) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000040)=0x8, 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3f, 0x200) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',_id=\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) signalfd(r0, &(0x7f0000000040)={0x100}, 0x8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "f1d8d98f"}, 0x5, 0x3) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:38 executing program 1: r0 = userfaultfd(0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x2, 0x101080) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000440)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) getsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000340)=""/240, &(0x7f00000002c0)=0xf0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r2 = accept4(r1, &(0x7f0000000480)=@nfc, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$inet_dccp_buf(r2, 0x21, 0xd, &(0x7f00000001c0)="ea455869fba92d5ba14672fc3ba54fc45f5c5e78cb81f3e9eb332229e6b94475050477d7ae5511", 0x27) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$inet6_udp_int(r3, 0x11, 0x6f, &(0x7f0000000040)=0x5, 0x4) 10:44:38 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x801, 0x0) r1 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r1, &(0x7f0000177ff4), 0xc) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r3, 0x79, 0x8000020, r4, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000003c0)={r5, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r6, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:38 executing program 5: socket$unix(0x1, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r2}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) fsync(r0) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r2, 0x201, &(0x7f0000000240)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$int_in(r3, 0x5452, &(0x7f0000000580)=0xe2e) fcntl$lock(r1, 0x7, &(0x7f0000000380)={0x802000001, 0x0, 0x5, 0xffffffff80000000, r2}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0x10) ptrace$setregset(0x4205, r2, 0x3, 0x0) io_setup(0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x1) io_setup(0x8, &(0x7f0000000300)=0x0) io_cancel(r5, 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r6 = open(&(0x7f0000000400)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r4, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 10:44:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8911, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:38 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) flistxattr(r0, &(0x7f0000000000)=""/127, 0x7f) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80000) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) 10:44:38 executing program 1: r0 = userfaultfd(0x0) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x0, 0x200) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x200000003e}) r2 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r3, r4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r5 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCGEFFECTS(r5, 0x80044584, &(0x7f0000000380)=""/29) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f00000003c0)={0x89, ""/137}) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f00000002c0)={0x10000bf0004, 0x100000001, 0x57c, [], &(0x7f00000000c0)={0x990a6e, 0xffff}}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:38 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xffffffff00000000, 0x202000) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:38 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x80) write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000140)=""/197, 0xc5, &(0x7f0000000240)=""/160, 0x3}}, 0x68) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:38 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80800, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x2000000000000, 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400218) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000b1d000)='.', 0x2) mknod(&(0x7f0000000040)='./bus\x00', 0xffe, 0x0) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 10:44:38 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0x7, {{0x2, 0x4e23, @remote}}}, 0x88) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:39 executing program 2: r0 = userfaultfd(0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8080, 0x0) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x8}, 0xb) r2 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x0, r2}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x800}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000002c0)={{&(0x7f00007d8000/0x2000)=nil, 0x2000}, 0x1}) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x70, 0x1, 0x3}, 0x4}}, 0x18) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="67446698010000000000000002000000461217f0924007bb8d4674c297b256ce8d64d7006cb43a9a2e25fe94182505a960a14508a3ea36e37bdfc0d2133d18869d66e9414af2d7ad174a82299c7b0b6a7dfb6f8d4b37ea29b639134dac131f32127d74138aa7171c5f1ebd316a1897ea77656c51f34c4f75a74fe541df7111b92f64f95ce3c932c8eb7e18d034cda9b5ff849bb893dbfc36e9cdf5143faa1315a9fb3a912b6e6bbf40f65e616db35c89f103dd73a7b708a82ff207a2cd72fb14186a7da53a5c0eaec2013d836ce0809a0b4b030fd18aa114c94651f29eae58af39e590543bdb422cb2cf8fd84174d2"], 0x91) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000180)={0x6, "dc3a62b552b060909d91e42d9e06ac3a13769b4b011a0a1e1dbce39b7d1edc58", 0x3, 0x4, 0x5, 0x400200, 0x40000, 0xc}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8912, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) [ 649.481574][T20258] QAT: Invalid ioctl [ 649.495054][T20258] QAT: Invalid ioctl [ 649.541135][T20258] QAT: Invalid ioctl [ 649.547269][T20263] QAT: Invalid ioctl [ 649.551232][T20258] QAT: Invalid ioctl 10:44:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x2, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x4004, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e22}, 0x0) socket$packet(0x11, 0x3, 0x300) modify_ldt$write(0x1, &(0x7f0000000340)={0x200, 0x0, 0xfbb662e7646498a2, 0x1, 0x403, 0x6, 0x80000001, 0x100000000, 0x3, 0x6}, 0x5) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000003c0)=0x1, 0x4) gettid() write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000100)={0xffffffffffffffd4, 0x0, 0x2, {0x2}}, 0xc) getdents(r0, &(0x7f0000001000)=""/135, 0x87) write$FUSE_ATTR(r0, &(0x7f0000000800)={0x78, 0x0, 0x8, {0xb0d, 0x8000, 0x0, {0x0, 0x7, 0xfee1, 0x610, 0x5, 0x1, 0x7, 0x4, 0x5, 0x56, 0x25, r2, r3, 0x1, 0x1f}}}, 0x78) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getsockname$inet(r0, &(0x7f00000009c0)={0x2, 0x0, @local}, &(0x7f0000000a00)=0x10) r4 = socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) utimensat(r0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000a80)={{}, {r5, r6/1000+30000}}, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) setsockopt$inet6_group_source_req(r4, 0x29, 0x2f, &(0x7f0000000580)={0x6, {{0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0x17}, 0xfffffffffffffffe}}, {{0xa, 0x4e20, 0x100000001, @remote, 0x9}}}, 0x108) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000e40)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) socket(0x11, 0x5, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r4, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20, 0x5, @loopback, 0x8}, {0xa, 0x4e24, 0x2, @loopback, 0x899}, 0x3, [0x0, 0x6, 0x3, 0x80000001, 0x4, 0x3ff, 0xffffffff00000000, 0xfffffffffffffe00]}, 0x5c) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bridge_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(r7, 0x400454da, &(0x7f0000000440)=r8) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000400)={'rose0\x00', 0x2}) 10:44:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:44:39 executing program 1: r0 = userfaultfd(0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x9, 0x4, @mcast1, 0x2}, {0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfff}, 0x9, [0xaf51, 0x800, 0x3, 0xff, 0x6, 0x4, 0x1, 0x1dc74306]}, 0x5c) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000000c0)={0x80000000, 0x30000000000, 0x1, 0x0, 0x0, [{r1, 0x0, 0x3}]}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) recvfrom$inet6(r1, &(0x7f00000001c0)=""/247, 0xf7, 0x40012100, &(0x7f0000000040)={0xa, 0x4e23, 0x4, @loopback, 0x10001}, 0x1c) 10:44:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x801, 0x0) r1 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r1, &(0x7f0000177ff4), 0xc) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r3, 0x79, 0x8000020, r4, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000003c0)={r5, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r2, 0x0) accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r6, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:39 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e23, @rand_addr=0xffff}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}, @in6={0xa, 0x4e20, 0x4, @mcast1, 0x5}, @in6={0xa, 0x4e22, 0x80000000, @empty, 0x80000000}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e24, 0x4, @local, 0x7f}, @in={0x2, 0x4e24, @rand_addr=0x7}], 0xc0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:39 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x3}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:39 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8913, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:39 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x40, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000140)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffff7, 0x2) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040)={0x8001, 0x3f, 0x2, 0x10001}, 0x8) 10:44:39 executing program 1: r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:39 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x20000) [ 649.933009][ C0] net_ratelimit: 22 callbacks suppressed [ 649.933018][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 649.944609][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:39 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000140)="52adbf28da254a268d31e6f1ee36aae457d7e2de4727fc7de7b28cfbb3293f56d4f6cbd834dfadd3b80eb2548d61222f8b7f9e44a86627b8663dd6285b1d0a6aa32ab7f4497d1dad8d0298ab385381fdb56a85e1") fadvise64(r0, 0x0, 0x8000, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 650.093022][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 650.098936][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00'}) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280), 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) 10:44:40 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x10001, 0xffff, 0x5}, 0x10) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:40 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) get_mempolicy(0x0, 0x0, 0x1, &(0x7f0000548000/0x2000)=nil, 0x7) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:40 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) chdir(&(0x7f0000000480)='./file0\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x200201, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x9, 0x0, 0x200, 0x0, 0x1, 0x8000, 0x2, 0x5873, 0x7ff, 0x8, 0x7, 0x6, 0x1, 0x4, 0x8000, 0x100000001, 0xffffffffffffff81, 0x7, 0x1, 0x4, 0x800, 0x1, 0x9, 0x20ce04f, 0x3f, 0x5d, 0x3, 0x7b5, 0x7, 0x6, 0x40, 0xc0000000, 0x8, 0x8000000000000000, 0x8, 0x0, 0x40, 0x4, @perf_config_ext={0xfffffffffffffffb, 0x1d5}, 0x2002, 0x80000001, 0x2, 0x4, 0x1, 0x815f, 0xbda}, r1, 0x8, r2, 0xd) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8916, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:40 executing program 1: r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:40 executing program 2: r0 = userfaultfd(0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002b40)='net/ipx\x00') ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000002b80)={0x80000000, 0x0, 0x85, 0x4, 0x1, 0x4}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x109000) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @remote, @broadcast}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bcsf0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002100)=[{{&(0x7f0000000340)=@rc, 0x80, &(0x7f0000000880)=[{&(0x7f00000003c0)=""/57, 0x39}, {&(0x7f0000000400)=""/13, 0xd}, {&(0x7f0000000440)=""/88, 0x58}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/193, 0xc1}, {&(0x7f0000000600)=""/185, 0xb9}, {&(0x7f00000006c0)=""/95, 0x5f}, {&(0x7f0000000740)=""/203, 0xcb}, {&(0x7f0000000840)=""/44, 0x2c}], 0x9, &(0x7f0000000940)=""/25, 0x19}, 0x1}, {{&(0x7f0000000980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000a00)=""/242, 0xf2}, {&(0x7f0000000b00)=""/64, 0x40}, {&(0x7f0000000b40)=""/166, 0xa6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/224, 0xe0}, {&(0x7f0000001d00)=""/146, 0x92}, {&(0x7f0000001dc0)=""/86, 0x56}, {&(0x7f0000001e40)=""/177, 0xb1}, {&(0x7f0000001f00)=""/12, 0xc}, {&(0x7f0000001f40)=""/247, 0xf7}], 0xa}, 0xb41f}], 0x2, 0x2022, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000021c0)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000022c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002340)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000002640)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002600)={&(0x7f0000002380)={0x268, r3, 0x500, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0x90, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x1b4, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xaf}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xffffffff00000001, 0x0, 0x0, 0x6536}, {0x0, 0x37, 0x1, 0x80000001}, {0x401, 0x7, 0x7, 0x1}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}]}}]}, 0x268}, 0x1, 0x0, 0x0, 0x10}, 0x40000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002880)={0x0}, &(0x7f00000028c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002980)={0x0, r2, 0x0, 0xb, &(0x7f0000002940)='cifs.idmap\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000029c0)={r10, r2, 0x0, 0x1, &(0x7f0000002900)='\x00', r11}, 0x30) r12 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) r13 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000002680)="d0e097a373d4287af245ae25b95952be92ded9037b0f2a38e8aa91dd58e0328611dcf7c993cb6e5828a0c77382d94a8526c81d63b327439bb441e8f69d1f85335dcfe89726851f2234d3f2f88d5bb9bbc149f4279f51a6aa3ac5ad941917a03da9e0b61758ca21f501d885cdd59344e1829b2fe5689566da30663173bf960d4f7637851c39aa76dece2a8e531787a2f32ab76f1cf73ae6153da1cefeacc915aba005350cb8a8fec5b130d984b102e1dfbfe4f859c18ff41a5b9c831a7d3ec4639b5e24ba2c02238139c8c2f8edbed9ee271c3a656feae4a57d207255af3863af8e8df9549e2c84ba05", 0xe9, 0xfffffffffffffff9) r14 = add_key(&(0x7f0000002780)='cifs.idmap\x00', &(0x7f00000027c0)={'syz', 0x3}, &(0x7f0000002800)="9639f9d8f3cce5be223f1e36cfa75431881bd4faee810dd38717a7c3aa2be7b86a8a09eb57c168c7713664d82d8be155e30822131ffc13c14a9d3a8fcabaa63b2b2f03dec9e78a6d0a60", 0x4a, 0xffffffffffffffff) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000002b00)=0x3, 0x4) write$UHID_SET_REPORT_REPLY(r12, &(0x7f0000002a00)={0xe, 0x7, 0x100000000, 0x1, 0xe9, "add743a735a64821004cb8278659c410f3ddfca706a4bbb39c7cea863f10306ea6a6ea7f052235401c2c0b66fef225aa19630af9aa2d747979fb11991618be6182155e0938ad26067024187d1744ba197f8485c5e8f5a2036f40b1c3a7d7c2223c909e0086f2bfa0627a45ad9c7fe72da78befb2b76a04add4ca26e3d144e7f547690dacc352eeb62417f2a31e9168721da6e044f9bcf09886246d82c6687a3b8b64104d0be63ffb5bfdc32fec4314074d298bb36a33e2750fe230683b39c8fb0559e94dba943c5765eff5e4d2a0bb6ba6959e506e68fb839c8b83e21c67984afeeee04807b4942a1b"}, 0xf5) keyctl$negate(0xd, r13, 0x3, r14) keyctl$negate(0xd, r13, 0xa08, r14) ioctl$KVM_SET_DEVICE_ATTR(r12, 0x4018aee1, &(0x7f00000000c0)={0x0, 0xe5, 0x270, &(0x7f0000000040)=0x3ff}) 10:44:40 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x5) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000040)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) mmap$perf(&(0x7f00001cf000/0x2000)=nil, 0x2000, 0x2000000, 0x10010, r1, 0x33) 10:44:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x80) recvfrom$rose(r1, &(0x7f0000000340)=""/151, 0x97, 0x10002, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:40 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="380efff5d8ddf5c21570bde96ddd557ade000000", @ANYRES16=r1, @ANYBLOB="000325bd7000fedbdf2516000000100002000400040008000100020000001400060008000100040000000800010040000000"], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 650.823667][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 650.830378][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 650.836987][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 650.843588][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 650.851205][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 650.857799][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:40 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00'}) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280), 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) 10:44:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="66643d7fc04808c4c5b5d4530e4bab02f2424caef4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:41 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = dup(r0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f00003ba000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f00002af000/0x1000)=nil, 0x1000}) 10:44:41 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x12}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x212080, 0x0) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000974000/0x4000)=nil, 0x4000}) 10:44:41 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c8f3202920b93abebe436f730383030302ca296fdb4b80069e6bbfdf23b901008fd2ee99e163f000000", @ANYRESDEC=0x0, @ANYBLOB="2c67726fc298b63b643d", @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x440800, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4eff, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={'rose', 0x0}, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default]}) read$FUSE(r0, &(0x7f0000002000), 0x46d) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) close(r0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:41 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x3}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80002, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000140)) write$input_event(r1, &(0x7f00000000c0)={{r2, r3/1000+10000}, 0x17, 0x9, 0x5}, 0x18) 10:44:41 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) prctl$PR_SET_TSC(0x1a, 0x2) 10:44:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x18002, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x18) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:41 executing program 1: r0 = userfaultfd(0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x100, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:41 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f000036c000/0x3000)=nil, 0x3000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000040)={0x6, 0x4, 0x1}) 10:44:42 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = getpid() fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) rt_tgsigqueueinfo(r1, r2, 0x1b, &(0x7f0000000080)={0x14, 0x8}) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:42 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendmsg$unix(r1, &(0x7f0000001740)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001680)=[{&(0x7f00000001c0)="9493c1544f7692ec6ded7c9a234428b51e61a91e33faff1785f8cf982b1e1f443a3a0508ef5e930e606fa903eb0aa891b27deba59706d36bd3a4a19d875968f843c53a13120f99496db5237ae492ba39e56dfdcc9d2dc6066b88c989b4565265acdcce22c40679966c999427b2ffccfdf7f71eb62b0fd961aae9a3630cb86b7bdc48b8749394a268c1a0e42c343f9f4a7b45ce505874386ab0084b124f5c4b246f2fed6ceb39373b29ff5c8a0292af3577f30aa2cbd79859355bd1856b3e24d327befb8c61078663f15cfb6f94505914489e10e0b72e4fca34a9e3f2ec1fb942300b4bb7b5d9c3b4ed9698f3c791", 0xee}, {&(0x7f0000000340)="9040fe172618738dd664a6055a699ea02d4291852f2e01eb79ae70f2bc749f232ed0d6286c6b3bb6fdec47584ebeb5acb3aa27b6e11a36fa949153a9b4e77f671c72cbf3ca67c8b8ce83d77eb0d2e3e0ba737b7b9a83cefd6e579bcca135ed0742875083cff00626c230017ce24ade0cda46dbc14a0f941e0f6a6a8b4a048bd20894d834d5b17dbb8e7fefb0d8fec5225417afff978c", 0x96}, {&(0x7f0000000400)="b6317120cbaa8c039be786f89389c1b0f801cb6de3207bc3ff6609cd34a0ada59c16162656b852775550a65b13189b2b0d110848682939975b4239fc0787e0d83f8e8f821f3d7ee3e7f739730822de7d410acc0e4cd43ec2dfd206bc1f4ec6f594f5ccbaf5d81734114989cf35f343b2d434deea7db6be7e3ea72fe19e1face9afd913cf445535fa0d625d573d", 0x8d}, {&(0x7f0000000040)="8a4c23f206f5a4253bc1b4891ab25ca9", 0x10}, {&(0x7f00000000c0)="442ca1fa7e0b8aa9bbe48d1b9bcc03fd05633e1270ef98c78989c8d5441bdf2cf5f182d1bbbe1e3591f4d4c05be03e75a98fc980c897d7", 0x37}, {&(0x7f00000004c0)="5ef3a25d5345a497693fb5f879d5c162948ceea79688aa8e3ec6d7108436c8e412ed65916bfa596ab0430efaaeb5d3026055fa2a3d8bd9190f70c716adf61f41003ee52adc9386a6c88d78909d94d0d4a028772e506d698b039521991a5620f27fb22f52c010d4456020584d8751135db170843c4b46fafefc8637577b8bdcdccac2c2aa764a6c59c81a0d1337473e27d0571208e35218df640804a1fd83c10b5ef39f3dd6c78e20f5a9c8200a7ec83ad37b7e6f1b1838a26c1430", 0xbb}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="e9a625a687af76084fc0a36c5947f8b55f09874c9089668138019ff2443094c4be03ababa535d4a30ee0004d1685a63ca01ae060f5ca7fe432bb2dfff46fe347ec676b59734be68c9ca9f5cfcbf9807db596991536d30d08e44db39f1159eae90be1f4565dd2284608f1e5f6674ebdd5df8c266c9674bfff8738283b1a00a7994c6427305669cf2a35af637a2e0574f6f029faeb2fdf51709539b4eb50ce22e822444b34010828af25ebc6dcb92da6a3b1378bd13e01ec98fec92f6bc786aef07cb4bd54962dd3e286894af87c06f86d7188af0dc61ba03fc3ec1016042872abac2a1e1d0d3b1c80", 0xe8}, {&(0x7f00000002c0)="3ccdf3a85dedbad88156", 0xa}], 0x9, 0x0, 0x0, 0x4}, 0x0) 10:44:42 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x7ff, &(0x7f0000611000/0x3000)=nil, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 652.813890][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 652.821283][T20456] EXT4-fs (loop11): unable to read superblock [ 652.830306][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 652.837749][T20455] EXT4-fs (loop11): unable to read superblock 10:44:42 executing program 1: r0 = userfaultfd(0x0) getitimer(0x1, &(0x7f0000000000)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:42 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:42 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xfff, 0x20000) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) set_tid_address(&(0x7f0000000100)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000400)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x82c3, 0x200040) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x7c, r4, 0x231, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x298}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8001}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x800}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040}, 0x1) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r3, 0x1f}, &(0x7f0000000180)=0x8) 10:44:42 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891d, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="66643db36af7bb4f993b0fa154ca7f69168226f985f09fb512b8", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) getresuid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000340)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x7f, 0x2, &(0x7f00000000c0)=[{&(0x7f00000004c0)="d1ad6afffc29e6c0572e0c221a6eec7589bfc25c94c7800cdadcdab495dc490facaeb23dc587c80ba0d2f5494b14cb1ca284716616144195aec4b3b6270839f298d6c31a51eb63690b9dbeae3dcfaaabb1b624fbfd827e51d7c69a0fe1e9ac0ad43c2631e0cbc9993bf96975051b5c013724673c5c8471838fbccfaa657e47e4a4c9e7f3ac2a4ce7e7355f1b9ea63b3249235af8348e60fb3cc184da3f5af00bc76d08ea0a3c14779f5e1f64f389c5939492c9da968a82d785dbff83ced53c7e6431c265d66258046919243a213e8dec", 0xd0, 0x8}, {&(0x7f00000001c0)="6052d31bd34d3b0190da4e93ad3380f52bf52d2a1b49b6430ced5f7872cd8731457c4810253b00ddffee1d9169c82524bd08b09fd402ba21b59e67e7b1d1da79dc281624d52f67fa082e3454ddaaa402843f78d32c43c36a7df4960f8053af3288084ab45c31ee954ad62d581e2131d07c7fc5cf8322adf34c599c", 0x7b, 0x6}], 0x8408, &(0x7f00000006c0)={[{@uid={'uid', 0x3d, r1}}, {@resize='resize'}, {@errors_continue='errors=continue'}, {@usrquota='usrquota'}, {@errors_remount='errors=remount-ro'}, {@resize_size={'resize', 0x3d, 0x8}}, {@discard_size={'discard', 0x3d, 0x7}}, {@resize='resize'}, {@errors_continue='errors=continue'}], [{@euid_gt={'euid>', r2}}]}) read$FUSE(r0, &(0x7f0000002000), 0x46d) mkdir(&(0x7f0000000800)='./file0\x00', 0x101) chdir(&(0x7f0000000480)='./file0\x00') mkdir(&(0x7f00000003c0)='./file0\x00', 0xa0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000780)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCNXCL(r3, 0x540d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000007c0)) [ 653.078322][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 653.088653][T20475] EXT4-fs (loop11): unable to read superblock 10:44:42 executing program 2: r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 653.227053][T20493] JFS: Cannot determine volume size [ 653.232443][T20493] JFS: discard option not supported on device [ 653.252821][T20493] JFS: Cannot determine volume size 10:44:42 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:42 executing program 1: r0 = userfaultfd(0x108080800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = socket(0xd, 0x0, 0x7f) get_mempolicy(0x0, 0x0, 0x1, &(0x7f0000ffe000/0x1000)=nil, 0x4) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x4e22, 0x4, @ipv4={[], [], @remote}, 0x2a0}, 0x1c) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f00000002c0)={0xf3e, 0x1, 0x9}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2100, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000040)=""/38) ioctl$int_out(r3, 0x2, &(0x7f0000000380)) r4 = accept(r3, &(0x7f0000000140)=@isdn, &(0x7f00000000c0)=0x80) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000200)=0xc) [ 653.278384][T20493] jfs: Unrecognized mount option "euid>00000000000000000000" or missing value 10:44:42 executing program 2: r0 = userfaultfd(0x407fe) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:42 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:42 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000745000/0x4000)=nil, 0x4000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:43 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(0x0, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) [ 653.446339][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 653.460447][T20522] EXT4-fs (loop11): unable to read superblock 10:44:43 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x559042, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x100, 0x4) 10:44:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:43 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(0x0, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:43 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000140)="9378c8c4a00dfeb279bbd9ae9ff0f03a1da8df86f9d0cf0a0db47b1744465a783701c0ccc63407f555cfbea2374a84d435313231a3f11fd276a8f3294b6bafdd916aef4cceb86ef63f7a999b1229f8e86913c2f212819c4dbfbfba03be29e74200a216b273d839161609efae062ce70a3867825f363da9db41a65633e172d1e443047f3ef11b068fa496a50defb3ee758d9117886de2be3a01660f", 0x9b) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7fffffff, 0x200000) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000040)=0x7) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 654.021254][T20499] JFS: Cannot determine volume size [ 654.034263][T20499] JFS: discard option not supported on device [ 654.040457][T20499] JFS: Cannot determine volume size [ 654.052539][T20499] jfs: Unrecognized mount option "euid>00000000000000000000" or missing value 10:44:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x446000, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) setns(r1, 0x0) 10:44:43 executing program 2: r0 = userfaultfd(0x800040000000000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x9, 0x439e27b87a06ca6f) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x40100) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x40, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000340)=[0x3ff, 0x7fffffff]) openat$cgroup(r4, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x589002, 0x0) 10:44:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891e, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:43 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(0x0, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:43 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0xffffffffffffffff}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:43 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:43 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:43 executing program 5: mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) [ 654.276744][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 654.284387][T20579] EXT4-fs (loop11): unable to read superblock 10:44:43 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) msgget$private(0x0, 0x3) get_mempolicy(0x0, 0x0, 0x3f, &(0x7f00006a9000/0x4000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 654.374251][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 654.394368][T20589] EXT4-fs (loop11): unable to read superblock 10:44:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:44 executing program 5: mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:44 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x200000) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x1, 0x7ff, 0x5, 0x8001, 0x16, 0x8001, 0x6, {0x0, @in6={{0xa, 0x4e22, 0x100000000, @empty, 0x1ff}}, 0x8, 0x1, 0x3, 0x1, 0xfffffffffffffffa}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x9}, &(0x7f0000000200)=0x8) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x181840, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x46d) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) chdir(&(0x7f0000000480)='./file0\x00') r4 = dup2(r0, r0) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, &(0x7f0000000040)=0xa021108) r5 = getgid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read'}}], [{@hash='hash'}, {@obj_user={'obj_user', 0x3d, 'md5sum'}}, {@euid_gt={'euid>', r3}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r3}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x4}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 654.866301][ T2486] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 654.873859][T20606] EXT4-fs (loop11): unable to read superblock [ 654.973012][ C0] net_ratelimit: 18 callbacks suppressed [ 654.973020][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 654.984494][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 654.990271][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 654.996069][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 655.001858][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 655.007645][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:44 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891f, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:44 executing program 5: mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:44 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 655.053009][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 655.058865][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 655.106358][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 655.114012][T20622] EXT4-fs (loop11): unable to read superblock 10:44:44 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:44 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000040)) 10:44:44 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = syz_open_dev$mice(&(0x7f0000002a40)='/dev/input/mice\x00', 0x0, 0xd00) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000002a80)={'caif0\x00', 0x6}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:44 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) [ 655.275489][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 655.286375][T20635] EXT4-fs (loop11): unable to read superblock [ 655.405635][ T2485] print_req_error: I/O error, dev loop11, sector 2 flags 0 [ 655.417776][T20648] EXT4-fs (loop11): unable to read superblock 10:44:45 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:45 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) signalfd(r0, &(0x7f0000000140)={0x3}, 0x8) mincore(&(0x7f000086a000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/77) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:45 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:45 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8920, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) ioctl$int_out(r0, 0x0, &(0x7f0000000000)) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3b67726f75705ff93669643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x4c0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 655.849105][T20659] EXT4-fs (loop11): unable to read superblock 10:44:45 executing program 1: r0 = userfaultfd(0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x801) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000140)={0xbb0000, 0x7, 0x0, [], &(0x7f00000000c0)={0x98f9f525ad514816, 0xff, [], @value64=0x2}}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0xfffffffffffffffe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r2 = dup2(r0, r0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:45 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:45 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000637000/0x1000)=nil, 0x2000, 0x1}) 10:44:45 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:45 executing program 3: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x109000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x7}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 656.173007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 656.178878][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:46 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x400000000000200) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f00007c7000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="360fc156fc66f2c1130066b94c0a00000f32baa10066b80000000066ef65a359c5660f00d00f15cf67c114da61670f090f01cb", 0x33}], 0x1, 0x10, &(0x7f0000000140), 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000140)={&(0x7f00009d3000/0x1000)=nil, 0x1000}) 10:44:46 executing program 1: r0 = userfaultfd(0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000140)={0x1000, 0x387d4357, 0x563, 0x13, 0x2, @stepwise={{0x3, 0x100000001}, {0x8001, 0x1}, {0x0, 0x7}}}) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x80) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000100)) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000380)=0x2, 0x4) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) linkat(r2, &(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000340)='./file0\x00', 0x1000) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r3) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000003c0)={0xaa, 0x10}) get_mempolicy(0x0, 0x0, 0x3, &(0x7f0000716000/0x1000)=nil, 0x4) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000280)={&(0x7f000020f000/0x1000)=nil, 0x1000}) sendfile(r3, r3, &(0x7f0000000080), 0x1ff) write$apparmor_current(r2, &(0x7f0000000400)=@hat={'permhat ', 0x0, 0x5e, ['/dev/audio#\x00', '[vmnet0wlan0vboxnet0+\x00', '/dev/audio#\x00']}, 0x49) 10:44:46 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8921, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:46 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:46 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f000027c000/0x1000)=nil, 0x1000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = mq_open(&(0x7f0000000000)='em0\x00', 0x40, 0x100, &(0x7f0000000040)={0x1, 0x0, 0x4, 0x1, 0x7efc, 0x100000001, 0x7, 0x9}) r2 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x3, 0x101200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r3, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffffffff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1317}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x5}, 0x1) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x10000) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) write$FUSE_ENTRY(r4, &(0x7f0000000340)={0x90, 0x0, 0x2, {0x5, 0x3, 0x9, 0x6, 0xfffffffffffffffb, 0x2, {0x3, 0x4, 0x0, 0x5, 0x40, 0x0, 0x0, 0x7, 0x9, 0xfffffffffffffffb, 0x0, r5, r6, 0x8, 0x2bd1}}}, 0x90) mq_getsetattr(r1, &(0x7f00000000c0)={0x20, 0x5, 0x60, 0x4, 0xfffffffffffffff8, 0x81, 0x200, 0x8}, &(0x7f0000000140)) mq_timedreceive(r4, &(0x7f0000000400)=""/218, 0xda, 0x1, &(0x7f00000002c0)={0x0, 0x1c9c380}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:46 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200002, 0x0) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x1, 0x6, 0x0, 0x6, "803c031e68ca890335d78c80a85e918d5ea99c1e038cd4928494245196f30cd0a5c09574407e5a32d24b0ef15a50c1e3eb672a97639f634a040bf615729e97", 0x1a}, 0x60) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000001c0)=0x25, 0x1) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f00000000c0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:46 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8922, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:46 executing program 1: r0 = userfaultfd(0x805) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = open(&(0x7f0000000000)='./file0\x00', 0x640000, 0x10) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x40000000}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) set_robust_list(&(0x7f0000000200)={&(0x7f0000000140)={&(0x7f00000000c0)}, 0x2, &(0x7f00000001c0)={&(0x7f0000000180)}}, 0x18) 10:44:47 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x3a000, 0x2) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0x7) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:47 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:47 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000000)='net/unix\x00') ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0xfffffffffffffffa, &(0x7f0000513000/0x1000)=nil, 0x1) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:47 executing program 3: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:47 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0xffffffffffffffff) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:47 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:47 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x4002) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00009d4000/0x3000)=nil, 0x3000}, 0xfffffffffffffff5}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x8420, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}], [{@fsname={'fsname', 0x3d, 'fuse\x00'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_lt={'euid<', r3}}]}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f74f032000000000000303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:47 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0xffffffffffffffff) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64IPIN\x00', &(0x7f00000005c0)='vboxnet1\x00', 0x9, 0x1) r3 = getuid() r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f0000000700)=0x80000000) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x100000, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@access_client='access=client'}, {@posixacl='posixacl'}, {@version_9p2000='version=9p2000'}], [{@fowner_lt={'fowner<', r1}}, {@euid_lt={'euid<', r2}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@uid_gt={'uid>', r3}}]}}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x70b000, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000740)=0x8) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000380)={0x6, 0x3, 0x4, 0x1, 0x3, 0x8, 0xda}) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$P9_RREADLINK(r5, &(0x7f0000000600)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) chdir(&(0x7f0000000800)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) lsetxattr$security_smack_entry(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64IPOUT\x00', &(0x7f0000000500)='trans=tcp,', 0xa, 0x2) lsetxattr$security_ima(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='security.ima\x00', &(0x7f00000006c0)=@v1={0x2, "1f8894413278397b9fe3c7c32b7d30"}, 0x10, 0x2) 10:44:47 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x20000000000001) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:47 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x10}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:47 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0xffffffffffffffff) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8924, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:47 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:47 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, r2, 0x1, 0x0, 0x0, {{}, 0x0, 0x4103, 0x0, {0x4, 0x13, @udp='udp:syz1\x00'}}}, 0x2c}}, 0x0) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000140)='./file0\x00', 0x7f, 0x3, &(0x7f00000013c0)=[{&(0x7f0000000340)="13d58a95e8d7f8ce7a42b7bad1718d28a98fedd164702f238d63ef1a6e7194e72033bf04552c1b81da72d3bf67a92c83f8e9c311f988d7b90c43ef9dd7e195a63c22c0651609da58744aa43511e900cd1e8bd4331f8fa78d4337b0a68c672bc094cb50fc1f6b8586d4a42652f3c7ab201fc6fb94baa2cb2b9092d61a30222a8fa6b1731d9ce9b2779662fb14c650c31e84da463f462566112ec8e794a9a767879be7cdf83c8ac1d1107176d80801a6169e6f6238a26368f74a35b8aa912fee84f667adffb0ea84f6209c94f84f045a2939d57b88b35b8d5516e3b3878e7ef55364037da9bfc593e9494afbeef7c240498bfcc021f2dcfe81c508eadd109568261275f34ee40b7a686be2a5a9d34fbe79b9d8c5b306da78552809cd0ec5bbbaec0074b121eefd8ed9066dc0a6e5b6fe1fe2670c635b6b30ebdf5a4d362039e878bb8f62d180188fda136e0b1b0579e750bbeff064e0d7b5de9e24ce490d46c682aeabf6f20c8a25a3e3fd2668e4f5e997c3ac36e34041deca6ef31272ec7e4ea22c9d9bf4b2b04c2cb3b5cbc885439e1a1851af72265d5155d1474ae646f2cc25e30f76bc8e1c300d205a73b2e172576b237fcf1f09a56dc3aab3c18a88319bb922e58a708391f0db659addd69f48491f4eb67209537ee4c9eda88d5137d864e4d8850fd04905f5e1fb2d32281cca0aebc50c7e247f28ab6dfd82efb29002699a39250660e7a961e25215ac327f37fcc81b846ea64ac20a50e62680fb03646b9882e724c7059375bd47cc7254522caa8ca6cba4b89202af3c2fd387b5f005d0565e417cd512c81211ef1565e1d6f61ff2949cd0e00b7da7b27ecef2517ee091fb254684d83cd8a62f2155df9fba9a6f6f119b7d5a633baeb307d31894d978dd09cb83b18b105cc2b93d41b3791b1902468cefae947c8a69586fa352a3a91beada3dd8b7c57c00b6c59f757d5ccf46bfebb0b842964b35aa7445d000001a0d33eb37737bee8a8f2c4267d005b5523451ba7f1d7944134fbd806e3bb40df9c9d7efd1c2d30ef305f57a2ce9bd54a1fbf7e9be1fc555f5b01623aae3c2dbcf8352a6d29204bbaf40fabcdf745af8b3371908099b5da8c44fa1ab180abf3e626dbcf330c9841f90cfb92bec7a1fcf005e8da46efd6fd82292e88ba1fa5300d247800e8f2375637d26ebf9872ac27f77304e5b521e636fb21149d71ad9f376763f1c316888eab4ec86e513952477c6a13c594ad3eaf98ab3b42dce38ef64a45a74876fe4c3bd6b58f215b421c779fd4bd897c070d8e60df64047a1138b77d3b20491bdd5eec12fac0b647dc77bbf571d916ba6ca2e3d979c31df54ea6ebf8aa396c86d96a6ab4f2071d98e726b39e4f603a4f6986d57bc3069599a367a43f134a0d77e581b122cf45f7b70363a043a5197e3f0418035fa6c445ac6c277cf03466e20daf934dc537226be377d1e95a34e27ef7625a1b10d611c04a46fa1ffe32a4ff13bed930be13ab52b0646f5e15e86ab8d0aa9a2d2d79d7498a7d47acc57a86442662a7dcdb9dd1874e4b9d3226fcadd32451a0e48f58c2994e97c77dd5381e0ca8781597e4a1814f49cecc70c73ad730738b6d72e3577f7d6cb3a16207b2a0cd5dc31f8b1fe1d2971759aaa43b6d105002d3b887c506d072e4488a97c69021c2ef502edadf9d5085236b7796c4dc9d2f7265aa6cfcdac54bee34cbacc3d38ae8d90ec4e077970436001aac90e79241206da0913010f8bcf24e0618a00135cd30d6f7a49f96718f32397dbe9f35e0a36e6636e06b08fb75eb8eb1488ddad553b7221c9f845b1fa220afa3c3fd39f490559d1933bcb27891d9a03087e1eb0b0811226e9a1903c9d8d5e6c75745651187c0a715966d71e31f8359a41fb03db285e9b5ecd7db1c5dc93eec49091cf6e529f4e0185efd3c369f43b1ec77baef2f31d8304d81fc9f73586e5735ed76f908a9ae9d322de01439ab9bf0ca7ac056ee1696737013bf6bf043023c34659e620dab7b044d9a0d0d49106b5136feeaa15fd51139051b0ecf9765900b56f4a28f39a51788113655c600a1ee06c10abefe38ce6045fae455abc5392675407c4806e7a92f8617be5d9bb2e9e1199f00e6e68eeac82ea9dc77e5901a08346a7db874bebf4937d476057efa75f94372253bda5639cf4bc522f365c9a1bdb8066d3e0fa3fc0e23c500690e2e3da77f469fbc976351273ef783e8aeb9962ab0c6f416214b35477ab94415dc0a6f62794e6b8658bf2effa628c6c93cc7ead686cd4453554730c4fdddf02771e0a375ab13b5f9515dc737a4736614246e9282bb93c5d1efc19e393a8a6892d2a143a2a54155eba99e07bd6d6672ec03cf8c5bf0602890b8c196e7410dad41294339cd7f73e12b18e851c1edbc1a75aadec06ea6ee6925e75f230972e9e9aa578220b437c2c4c9ea9d464d8f9da92b07574febbcd331c1e9d57941eba36dd7ad1b42a5ea26a283fab7a506e2a592de4f7e59f13ac4433c4406eefdabd731917eb602fe40cef24458a6819e9956bf5592cf8f9964cb08fa187775ac24e6222fce3b159ff273a321018a9cd51ce8b5780002544db21be7775ee883cec7d03794d15bbbe420c976f54bfe8c0c4f1f58da975b3c98e037ed91770c2d95368693cfb4a2a36987df5b1f38b8fe52d18d625b37140143296f00fffdf1b36440d820189cb63842b34375b0dcf7d2c097d4936c6cab872a7a0c86cb0d216eaec303d3f4cf1342e5f0101056433ebb5cd418e8c99ef27226167890d80032ed31ea3ca946ac4a22824b1e99485519375356f4e6891dbfe087fa1539cdd2844bd38fbd8dcd64a2e340b627a398aff07becc20f52d9c7e02d7eda4fb514819632b9447cb2a0175fd9ab3839aee48c292817f2c6e5f138e4561e553571817dfdbe09bfdfbc855644bd966a7f7a0732e6d7bba7194bddf4f7519ae07ecbba08baaa12eccb46413ae9e37ddcb302ce0639a0a278a4482d24fb53f04eae81ebb3fb37b3e0b524c7d50d54801b0563b7f7a0cb695a5979f99966605b6fe50d5ac334c72227d1e6607964bb7089b92ba8535f18f26bc4c0ded222e0e909b759a6fc023f5d89ebea7f76cc1df078d582ef7a2c1104c799cd00bca9e9d9a33463759d73f3a93ac4405aaa32781d49dc71e235d76a91a54050ddb54eccee1610f08919f34261edcf97b92a616295c94ff0e36bda41b939f299818ce10ee3a0eec85c5a46d7ccfa7f408c1d01bd9ce2cb7ace0cd36810656ef25d8ee7ce8089915f8643bf32ab01dc614d8369988de11a0f5c1ec44b4d97590ab3dca6206a69ac3153ecac28c36f04e0e8e9379d3bb182f2b671bdb18cb88f9985cf84eb2e421fef56d4e5275c89aa35c6d337e9a4bf40e2da923599d11aa01ab78764a6c95b240f7c3f7d5ce05f8c894824aef652df13161ee55009d40add59e672ddb27d9c61207a90e71de0d29369a23a8e0711b270aca595781e8e7cd2b671cab364fe38567709eb97b1479b5b5971b3501361a8fe539c2e9bd6d5369d1f777eab75918c4acc6fe3f93bbb79d568fd93ed8180219bc1cd70fcc3ea36812c0464b18bdc92401afe14ca7914bd0df768a4dfd70ef3b1350b9b05a3bbe5d338ef8e9f37d41583a37b00ea05425d0ea5ae97a17a19af22e9b4af7b02899fe8558f0d63e192932ad7d1e06a97cb0b15166f56cfe6e6920d34e1546898fad2c1deb8c906a6778b6697745ca46706096b2fb0e599201357e1047b7ffd0d2a136fab7eab39563eea20c260c8403f49b0d725710c44fb1138d52b32631728f4099b5a7e4f8639d6d19acd1ec98f72e6af412e84d0665b8f209f3f26b4419986851ab09e9d9e8e55b0346c50a0dd3bff4391aa8b8f2f3370039c1e6ebaa7011ba10544f2d823bb8346b65926c0f5bdfeb71cfd98ec3a2c0f5aa7f32fcefceb97804ab43b2074d69b378b32cddfb05a4dd620f0a2c082a204a2253f852a25cf40be8a1ea4129eb98a336736d28f9ebede70262dd321f6ac71a08775d9527b8bba92bdec6aed548f902a9fbbf3a7f1ecf04937a18fe06ff9aad2940e33ac3213d1cda4a6a35055b397c55a699f282c25836a134dfbca86a39932f634a457b4c4dc64fbc8aea8a429b9a4b777582ab2980ef674bd2ed843b73758e98ce125139dd6a2bb8b02173caf54bd6a3917ee8bda9808ea8443b5dcb1fb69c4513edc8b1c3b7638d6ee09bb849daf1ff6141beb9e1330cae193c687333d96a31efe963abe569f5e5931e035e88ea403185ddc079760983a5d7991de869a965cd53e86dad9c8cc010360769ea7b8708b228406dcedbe3ae9eceec93786891bd420d845ee4ec7208ca2cb563570ea6b293f1b2cdb7d5a9c17fbd1f4260052789703557e5663e56b9fadac8ea79838cc7cf759c29e26f59ffbbb70487ee4a12bfc5d3cf06bec2371753c16317c3c9bfaed92130e1546c0efb51d5b832754b7590a65f4a4cbd80b669302dc8af25ab92cd671458e6d0721eb1a9a504012bdc8ec8e6c26c33d3c37f75bf3ba92c9d64a5230bb6d4bccde98fbc92ae1c20e134161e24b8d707786bd59d7a34d5a5c544d520148ade3438125a695f9cc8739ceec8ea38b76111905a182ec399ccd1cc61d6e6913d74ed5846f2dc4cf5576eb471163cf457b65050b90fbf2a89cffdbb55825637b9ece09b17919fa95d3c6c22dd857bfa1e6c5906362d8eb788a7d478d46cd8834d1b581ed8268cb1831ea99b574768987e9c23de72e6fe10ad3f5afb94718d1cdc45b3c552b02692889d6baa6f2e0bf9cc656be25a7304426dbe51f0a1c3c6eca2cfd4aa9b24462280c98e370eec12a72bc48cd56055b0e692fea3cb1981e8fdce593539a5831947624c33773fb4092bfd3b11a17a9dfc77587b4dfa2e858a8821428a03d857fa8dbe41a9c74b8ee5064679f5f9eac4d927c8b4785a5d89bcb7173b9960ae0d0a7d36dd40df5873396a5a062b81fe6216f449260a0f3639405fbb628b9180c26301b11d074542ef6eb4a38eaecac272aa8c6e6922630048b9ce724074f9d048b70465e79b1c71f2c86a25829da3527b1e0d8af8f5b6fcce84dc3bdc263b3a42dba8f3f11a07523f9dc76db1c63d88cd0b1fd0867c32859879ed763f1599e8f58cd5aacb27c3a4fa3ee00549f24f5212c15d9af288e63277e0333a393347c60812d22e0137ba825f05d47101b3c11ca4ef73d7e4219cddc07f045af87c627f21d56d05d55ea9f2a3f11e55b4c074905e7df3104cc6b60307847fc8261d80fb7958b37bdf69970dee4a5d5727014d3af0aabbf1d5057287fa67073728ce6208e615aedffb2ac3cfee301c0263f91a16183d3745e602ec7126db4dc340d69d9fb00cbcf94a52e69dff2002ccef354f10f5819eaadebb6cea65fb2488605c98597f0559a98f4a56791e6d71a579b8dfcf6ec2ecda0bacdff29207524859bbb0fdbcdbbad6fd95e37ee7073b3e4c6d805369067474c5bd7cde38d0db3c5a090d30641a01763e3bee48c28cd0a3c78fcfa9a82015a5a7867d46fb32f8cce5e50ae1f1bc1f9a0614656cad72fea094406a7554c09a79037a0c265ae353efc9208be7a9567391807f78e44559fda07dd7ef497e3182ac60d0f31a80c0ce6308791224b6f106917bf636e50f0150e5340978f4ffbcc672cdd00b5ad3dbed2c2cd29d7181122b85800d145f99a292cbc3fe2eb7b8cca8ac83c64444b7ebff75379d9e9d2f609f84795d42a17b52d888d4e2513a9b2764374645816b2787414557f20ea60b8340e054a507fad06c419e7e5a475c33a6", 0x1000, 0xfff}, {&(0x7f0000000240)="ac3fda67ecd9ebf8c91aeb04532cfd615974daba1214b024e1e00dcb1dbe46c39ec9deed42b66ab8927b0a006c4cec746aea25cc7fdbf1896a98a23b370190fe1117c15f1761ac86fc40c4f86f0f65587a6a88388500ff46188fbc1133f18aaedbc6cf7bad50fcb48c940acc4bc3225004b507a859f3c827fa0eb205115d32d03db517c0", 0x84, 0xfffffffffffffffe}, {&(0x7f0000001340)="ee5960c5185658cb25e6138bf8196229adc5423b8a187ccf8106d1ebc8a987536a60a74cefe0edef4261f4ea0fa61cead5de9efc8a48267d4f8c25d27d0b2db9e735d641b335ac2dfd1b2370ec4b30614925fb1afea655ddca934fa344a1dd5270b685df6946a42cfe51c67515e5c72c0161d7a369", 0x75, 0x3}], 0x8000, &(0x7f0000001440)=ANY=[@ANYBLOB="61636c2c6e6f757365725f78617474722c6661756c745f696e6a656374696f6e3d307830303030303016303030d2323030303030322c6f626a5f757365723d73656c696e75787b757365724070707031736563757269747913656d302c6673757569643d653535b2007e003e2d003f32622d307f3a3d2d357764642d63007f77667764762c636f6e746578743d73797361646d5f75"]) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) poll(&(0x7f0000000000)=[{r0}, {r0, 0x1000}, {r0, 0x8}, {r0, 0x902b}], 0x4, 0x101) 10:44:47 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) [ 658.079756][T20844] e Filesystem requires source device 10:44:47 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x6000, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000180)) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000340)=@add_del={0x2, &(0x7f00000002c0)='erspan0\x00'}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x6, 0x2, 0x7, 0x51, 0x2, 0x9}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x103040, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000280)=0x400, 0x4) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x40281, 0x0) 10:44:47 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 658.143225][T20850] erofs: cannot find valid erofs superblock 10:44:47 executing program 2: r0 = userfaultfd(0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) ioprio_get$uid(0x3, r1) ioprio_get$uid(0x3, r1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000061e000/0x13000)=nil, 0x13000}) [ 658.225813][T20859] e Filesystem requires source device [ 658.244510][T20855] erofs: cannot find valid erofs superblock 10:44:48 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1ecb8702, 0x400000) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) r1 = userfaultfd(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="3700000435693c55e2c5d1a90ff3000600000000000000000000000100000000000000060000000000000080076a0e0000005241000000005d3a"], 0x37) 10:44:48 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xc2, 0x82000) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000340)={0xe1a4, {0xda, 0x4, 0x2, 0x20, 0x3, 0x10001}}) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="84665b02babb67caa6e55d1fe7f91434d0c0c1f6786470409edc0edb86dca80cd9886d821aeacc05ad2ad7f970fb0b9fc5f7ed1936bc0677f3e9754c8e867831dfca0b60f03f666b5332ec315c4834dd413ba50715", 0x55}, {&(0x7f00000004c0)="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", 0xff}], 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x4e21, 0xf3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100}}}, &(0x7f00000003c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000680)={r3, 0xe3, "6e58799dcf5ec880b09290fb1e5a7e38b8e58541dff4e835663103798bceb04e234e3550d21a008a75ca32569e977a314acf66639be1f9a3d8975f7fe467a7f33fbd6c7af5843aa7b212dd8e622796ea1ca7fbcb373da514002cdfaded7ba167deb1869fe07267a8116757b003437b0e605be88ad4f676ba9768be0cd264ab483c3c3cdeaed5573678320b661224e234dd446da477a2096b491e5383048ec062c3fe1d759f25b4936be3ab02032d00c8f64df09da26f8f081c77bf122cdf83838b03e20be94134b00d8cfb5f019a726fecd419b39f6eb0e3e2b96651df78d710df0c6a"}, &(0x7f0000000780)=0xeb) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f0000000380)={0x6}) 10:44:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8927, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) [ 658.720252][T20893] e Filesystem requires source device 10:44:48 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', 0x0, &(0x7f0000000180)='ext3\x00', 0x0, 0x0) 10:44:48 executing program 1: r0 = userfaultfd(0x80000) mmap(&(0x7f000064e000/0x2000)=nil, 0x2000, 0x8, 0x140010, r0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x10000003) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa00, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000240)={0x4, 0x2, 0x0, [{0x236, 0x1, 0x7, 0x22800000000, 0x1, 0x4, 0x1f}, {0x9, 0x8001, 0x28000, 0x3, 0x10000, 0x200, 0xff}]}) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x40000000, 0x6, "5da757c4eca19a6d1b8fa2f86db7f77a19ce4e0c2edbb38601f9cbd7a051af72", 0xfffffffffffffff8, 0x3, 0x0, 0x0, 0x6e, 0x80000001, 0x8, 0x8, [0x2, 0x10001, 0x6, 0x1f]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast}, &(0x7f00000000c0)=0xc) accept4(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000001c0)=0x80, 0x800) bind$xdp(r1, &(0x7f0000000200)={0x2c, 0x5, r2, 0x3e, r3}, 0x10) 10:44:48 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', 0x0, &(0x7f0000000180)='ext3\x00', 0x0, 0x0) [ 658.881480][T20914] Unknown ioctl -1072688510 [ 658.896653][T20914] Unknown ioctl -1058515353 [ 658.916966][T20914] Unknown ioctl -1072688510 10:44:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:48 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', 0x0, &(0x7f0000000180)='ext3\x00', 0x0, 0x0) [ 658.933216][T20919] Unknown ioctl -1058515353 10:44:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000080)={0x1, 0x0, {0x3, 0x100000001, 0x1008, 0x1, 0x7, 0xf, 0x1, 0x7}}) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)={0xffffffffffffff9c}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000800)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000001b40)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001b00)={&(0x7f0000001880)={0x248, r3, 0x20, 0x1e0f, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffffdf0a}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x35f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xdeb}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9d4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7de7}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x348}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xcec}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x247}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffe}]}, @TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xafa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7093fdd3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x64}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa86}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0xc004}, 0x800) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:48 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f00000000c0)={&(0x7f00000ae000/0x3000)=nil, 0x3000}) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000000)={0x0, "b372b7dde54049befb7f202e9350f0057ffe85b903c6ef91c7b830f1193ac9d2", 0x2, 0x1}) 10:44:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0x64a, 0x5, "141e0f2e49c71056c539bda0260492185dce8c3997e579528c213148e131f8c2350ef2c71719f0dcb54ebda40c264d1ce24ea09655cc7cbcfbe2f2fa606421a516634d65afa3fecdc3be4c28661b11123efee1a31be123fee16c3513ffe6987e820b63800df1458d973034f83b9861f00da243b4e70dc83540d23a27a5de55062d728d0a3c25312580f18c0dd13c16572ffb3841dc7b166eac366b2282abf4cb2b76f06b1a9709c86390d71195edf14fb456a95fdeff6c801decd1733fa987b0ce954fc3bd56816ac3815364cf3ffbb840808fb65b93deab001919885517739677fd028e066839c654b348863e9b3ecce2df1097a7b7f3e155d1cc9148bc4441", 0x6f, 0x9, 0x0, 0x0, 0x82, 0x2, 0x5, 0x1}, r2}}, 0x128) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:48 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 10:44:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8929, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:48 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 10:44:48 executing program 5: clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 10:44:48 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = dup2(r0, r0) write$input_event(r1, &(0x7f0000000000)={{}, 0x2, 0xa4, 0x81}, 0x18) 10:44:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f00000004c0)={0x3b, 0x3, 0x7, [{{0x2, 0x2, 0x35, 0xaf5, 0xffffffffffff7fff, 0x10, {0x1, 0x100000001, 0xfffffffffffffff9, 0x3, 0x200, 0x0, 0x4, 0x2, 0x3, 0x3, 0x33a8, r1, r4, 0x3, 0x80000001}}, {0x3, 0xc08e, 0x0, 0x7f}}, {{0x1, 0x0, 0x8001, 0x9, 0x1, 0x9, {0x3, 0x0, 0x1fe00000, 0x7, 0xb11, 0x5b77, 0x8, 0x791, 0x7, 0x0, 0x2, r1, r2, 0x3, 0x100}}, {0x0, 0xffffffff, 0x0, 0x8, 'vboxnet0'}}, {{0x3, 0x2, 0x8001, 0x1, 0x4, 0x7, {0x3, 0x0, 0x2, 0x0, 0x81, 0x100000000, 0x1, 0xba7, 0x101, 0x7fffffff, 0xacd, r3, r2, 0xfffffffffffffffc, 0x8}}, {0x5, 0x750, 0x0, 0x400, 'rootmode'}}, {{0x2, 0x1, 0x7fff, 0xff, 0x20, 0x2, {0x6, 0x8001, 0x4, 0x6, 0x7, 0x0, 0xfffffffffffffc00, 0x3f, 0x6, 0x1c, 0x9, r1, r2, 0x7fffffff, 0x800}}, {0x6, 0xfffffffffffffffe, 0x0, 0x80000001, 'user-securitycpuset&'}}, {{0x6, 0x0, 0x3, 0x0, 0x6, 0x1253, {0x6, 0xfe, 0xedb, 0x7, 0xfffffffffffffffc, 0x7ff, 0x100000001, 0x7, 0x100, 0x39, 0x97a, r3, r4, 0x2, 0xffffffffffffd7e0}}, {0x0, 0x6, 0x0, 0x100a}}]}, 0x10) 10:44:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0x0, 0x8004000000000000, 0x0) 10:44:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:49 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000180)) get_mempolicy(0x0, 0x0, 0xfffd, &(0x7f0000ffa000/0x4000)=nil, 0x7) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000040)) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000000)) 10:44:49 executing program 5: [ 660.333020][ C0] net_ratelimit: 24 callbacks suppressed [ 660.333029][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 660.344521][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 660.493051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 660.498978][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 661.213041][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 661.218854][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 661.224724][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 661.230468][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 661.236293][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 661.242028][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:51 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x101, 0x80000) accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c, 0x800) 10:44:51 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x4, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = dup2(r0, r0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000040)={0x3, 0xe99}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:51 executing program 5: 10:44:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8930, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:51 executing program 3: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4102, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x4000000, 0x400800) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x800006) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:51 executing program 5: 10:44:51 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) sysfs$1(0x1, &(0x7f0000000000)='nodev[\x00') ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:51 executing program 3: syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x8, &(0x7f0000000880)=[{&(0x7f00000001c0)="0d750910934202450140e8fb758a57", 0xf}, {&(0x7f0000000200)="dce772618854f7bb469f1a019427383c69ef5ed82513e6ec9a864ea45458336d1df36f97197fe065f2", 0x29, 0x8}, {&(0x7f0000000280)="827ca1c53cf6fefe65389129ce45e7b9c2ccc297e0f6a296c19258cd5ebdb4d16458cd0b98221758ef4477ad094aa65bdcee651eb0a0b5733ba7bdf16423a420afa8f51d8fd0d5f820eaafc98e1f1a21204299255617535c6f1ea09b30e9c9f1879ca00575d95f573751fcc3cce32a01a0864951f080a6c8", 0x78}, {&(0x7f0000000340)="ef852572f1fa6609dd96c7deec2638bb4572ea4b4420a615a1d66eee7da55e093ba742e779fda73b6e8ccca824330da845525494e575d4a53b166084a57e2853d27f2c78774189e4cdf10f25e3c7bae0d272994c2fb107d6750d670a047563457431b6af37", 0x65, 0x50000000000000}, {&(0x7f00000003c0)="fdb8c263a12f", 0x6, 0x20}, {&(0x7f00000005c0)="1b1e651d187541c5ae1a754630bc872a12045494172cf19e2541c6f5d4d2214712eeb2c1a679a4625d84cd1c75d15a4bff5421e12131f626887aa13f22c1fd586f1e074d8d60f2b17750b15200bccb6a066289cf575943941313de944cceedc974d9692c1d5508f91c355d7cbd86210944157bde33cf906da9ff4a87039d66f2091b86f7edde796a08bf5e163a120d50fb8a9172eb91", 0x96, 0x8}, {&(0x7f0000000680)="79242f1bf141e2813b8ff15746fabfbb37eb9f5bbac875bb97f9bfe8584444b7d344f270641ce32e9fcd3d19bbcb820e2b9fb1d51793e81a546fb41fe6c96af0b90995237ee7ba0142a676d80ddacd1533e7868f080e2cd953933a64aa6bd525023ec4d435bad29dfb1f340ee9e7848272f61b3a40a5ff13e29b12cdbd28eb504150c92c5705947d13a27cf5e1caa44a22948c70eed525222fce9c1ea423e81e0af8928769447fba4644dc122301efe3771a30c58d1276e5a6dfd3166a72eca931994ee388df2a95934f4292794b6fbe1b14d58337a52cc3fd4bab90dec8b64a1c44d6daa8", 0xe5, 0x6}, {&(0x7f0000000780)="9843c2340de80d4de50aeb169d7f2fde44661b079e35b271ab33878f7a619cfc706ee73f74983f513b33db08d852e34ec6659b5beb20b590e256687b307159171fa9400783b66ef411ea66341e20740546d94880638105a15a3c05da14ba7992b6ada85616f1c5da966932fe22e8bb17af7cc94aba92f0c1374bf5a6d6facea9f07613f9590fe70a268a4eb713cfc56f24496c29009b4aeeba6c1d77556c80dfbfcd4ecf18fc309c9ff152c42e1a78f10249d4a9c085d901a1a5855cedafcfd7e77ed62efa2b", 0xc6, 0x6}], 0x2008000, &(0x7f0000000940)='group_id') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8000, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000980)={0x0, 0x57, "87317583596e2041df6226c335f84ba56860a92f5efa3e87a467432afb89907adff27a2267d766843166572c5433974b084ef77f909667d8d2093b15fa7a8ae0d20f74afda05bbb62d3d0c18ba67503111d26e19ab4223"}, &(0x7f0000000a00)=0x5f) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000a40)={r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}}}, 0x84) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) write$FUSE_BMAP(r1, &(0x7f0000000000)={0x18, 0x0, 0x3, {0x7}}, 0x18) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="10000000000000011a12527aa5469a9ebefce81ed509ea7a5ade1d9a3809e235ff186ebdaa4c906f544befc80b60eab6ab80272117830907dac8c569f8ac430d93132ada8cdfc57c58744356d794d5e000869d0f8230f93580db129a8a2c632f42c88ffcb18dcd78b07fc2401dd6b7eb2b209b40f778cc07f9fedab70c8267e1375ae3788dec42a0507dc963eb0266624950de49504f2577ac719efad401d79b3e1759ffd905e2be6820ae632505433de574621e243b55be480cdbbbe3a304e2000d9ee586d85a4b8a56972f8af8cf"], 0x10) 10:44:51 executing program 5: 10:44:52 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000240)={0x18, 0x0, {0x2, @empty, 'vxcan1\x00'}}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendto$inet6(r2, &(0x7f0000000140)="b11313c93828b0e960f58de574a697952e3a1f4afa6e82e72ce8775b20d2d22e882e725401f850d9f3df359d61839d7fb638db4e573662bfb14d178c917ff4442f068c298fc86e9a62239ac1466ba9cd1eb79f416cdc2a64d8af7eb3625ae81b7597f903959150bb2dd1a2f029f24dd36f25e1895eb0f3f02eea", 0x7a, 0x50, &(0x7f00000001c0)={0xa, 0x4e21, 0x2, @loopback, 0x6}, 0x1c) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="000829bd7000fbdbdf250600000008000500040000004800010008000500040000000c000700200000002000000008000800d42e00000c0006006c626c637200000008000500010000000c000700080000001000000008000100020000000400020034000100080004004e23000008000800040000000800080000000000080001000a000000080002003d00000008000b0073697000440001000c00070020000000200000000c0007002000000002000000080006006e710000080006007368000008000200000000000800080008000000080009004500000008000500050000001c000200080009000000000008000900c00000000800040006000000240002000800040003000000080004000400000008000b00020000000800050003000000"], 0x128}, 0x1, 0x0, 0x0, 0x20000000}, 0x48001) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:52 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) 10:44:52 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x501000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000000c0)=0x400) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x2, 0x80) [ 662.486309][T21040] ceph: device name is missing path (no : separator in /dev/loop3) 10:44:52 executing program 5: semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0xffffffff}], 0x1, 0x0) 10:44:52 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) connect$caif(r0, &(0x7f0000000000)=@rfm={0x25, 0x0, "f646c04e415d204c36350e550bebe7e7"}, 0x18) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:52 executing program 5: 10:44:52 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0}, 0x20) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x26) write$cgroup_subtree(r2, 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x1ff) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1703) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) openat$cgroup_type(r3, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) 10:44:52 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x1d, 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = socket(0x2000000000000021, 0x2, 0x2) shutdown(r2, 0x800000000000002) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 663.176060][ T26] audit: type=1804 audit(1549795492.700:57): pid=21080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir721309404/syzkaller.Yk1Nmi/423/memory.events" dev="sda1" ino=16737 res=1 [ 663.205879][ T26] audit: type=1800 audit(1549795492.700:58): pid=21080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16737 res=0 [ 663.228505][ T26] audit: type=1804 audit(1549795492.720:59): pid=21080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir721309404/syzkaller.Yk1Nmi/423/memory.events" dev="sda1" ino=16737 res=1 [ 663.260323][ T26] audit: type=1800 audit(1549795492.720:60): pid=21080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16737 res=0 [ 663.286890][T21040] ceph: device name is missing path (no : separator in /dev/loop3) 10:44:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000340)={0x7, 0xd, 0x7fffffff, 'queue1\x00', 0x40}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x8000) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000080)={'veth0_to_team\x00', {0x2, 0x4e24, @empty}}) 10:44:52 executing program 5: 10:44:52 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x8}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f000086a000/0x2000)=nil, 0x2000}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) ioctl$KVM_NMI(r1, 0xae9a) 10:44:52 executing program 5: 10:44:53 executing program 5: 10:44:53 executing program 5: 10:44:53 executing program 1: r0 = userfaultfd(0x100000000080800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x94800, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x81, &(0x7f0000000140)=0x1) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000180)=0x80, 0x4) 10:44:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8933, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:53 executing program 5: 10:44:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:53 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x81, 0x40000) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x101440, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) set_thread_area(&(0x7f0000000000)={0x3f, 0x1000, 0x1400, 0x101, 0x400, 0x7, 0x100000000, 0x80, 0xff, 0x7}) 10:44:53 executing program 5: 10:44:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:53 executing program 5: 10:44:53 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000274000/0x4000)=nil, 0x4000}, 0xfffffffffffffffe}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) timer_create(0x6, &(0x7f0000000040)={0x0, 0x13, 0x4, @tid=r1}, &(0x7f00000000c0)) 10:44:53 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8936, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:53 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040)=0x1b0, 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0xb7, @remote, 0x100000001}}, 0x1000, 0x9, 0x7, 0x2, 0x2}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x2, 0x1, 0x6, 0x3, 0x5, 0x9, 0x2, r2}, 0x20) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002f2000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000029d000/0x3000)=nil, 0x3000}) 10:44:53 executing program 5: 10:44:53 executing program 1: r0 = userfaultfd(0x800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r1, &(0x7f0000000140)=@rc, &(0x7f0000000040)=0x80, 0x0) 10:44:53 executing program 5: 10:44:54 executing program 5: 10:44:54 executing program 5: 10:44:54 executing program 1: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x6) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000004c0)=""/201) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) 10:44:54 executing program 5: 10:44:54 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="7719de662ef123ebe2216e73726e6a786da70384c78f52484833460814a32e62ada3dfd47a4d53c29ab092b615f88284ff7c76b7f3a61dada13ce40e683cc3b078199455a1077c60f2a3a3849ea5bfb8fcbf5754c6044bb27d6360c29f5fd8258c55765e27050992b1ef348578d0903555082415c381f9b636316e33eab56d6a60c2c3a470ddf19b9f313099056d30ea64162570033f", @ANYRES16=r1, @ANYBLOB="010025bd7000ffdbdf2501000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x8041}, 0x4001) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000655000/0x2000)=nil, 0x80000000, 0x5, 0x40, &(0x7f00001ee000/0x1000)=nil, 0x91}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) 10:44:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8937, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:54 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x0, &(0x7f0000000140)=""/251) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:54 executing program 5: 10:44:54 executing program 1: r0 = userfaultfd(0x800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x2}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00006d4000/0x1000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) readahead(r0, 0x80000000, 0x8001) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) connect$unix(r1, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 10:44:54 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x23e008da, 0x2) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000040)={0x7fff, 0x4, 0xffff, 0xe0}, 0x10) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:54 executing program 5: [ 665.373060][ C0] net_ratelimit: 18 callbacks suppressed [ 665.373067][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 665.384746][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 665.390577][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 665.396377][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 665.402210][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 665.408019][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:55 executing program 5: [ 665.453086][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 665.458971][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:55 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ff3000/0xa000)=nil, 0xa000}, 0xffffff7ffffffffe}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:55 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:55 executing program 5: 10:44:55 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x0) write$P9_RVERSION(r1, &(0x7f0000000040)={0x13, 0x65, 0xffff, 0x101, 0x6, '9P2000'}, 0x13) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x280, r2, 0x711, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x1b8, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc0de}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9d7c}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x80}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x36c, @ipv4={[], [], @multicast2}, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xffffffffffffffff, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x100000001, @loopback, 0x7fff}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xc6, @remote, 0x739}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1000, @empty, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7, @empty, 0x9d}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x4, @loopback, 0x2}}}}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff0000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}]}, 0x280}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030300100000001000000302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x18) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000280)={0x6, 0x3, 0x9, 0x1}, 0x10) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x2, {0x7, 0x1c, 0x7, 0x400, 0xffffffffffffff81, 0x32d7127a, 0x7ff, 0x5}}, 0x50) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8940, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:55 executing program 5: 10:44:55 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000040)) 10:44:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:55 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0xfffffffffffffffc, &(0x7f0000ffc000/0x1000)=nil, 0x1) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:55 executing program 5: 10:44:56 executing program 5: 10:44:56 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10001}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x148, r2, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c0000000}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3c7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x48f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x28}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e79085}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x415}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xec7d}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x148}}, 0x8010) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x80000, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000000)={0x7ff, 0x13, 0x6, 0x2, 0x9, 0x8}) fcntl$notify(r0, 0x402, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:56 executing program 1: r0 = userfaultfd(0xfffffffffffffffc) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000240)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x218, 0x0, 0xd0, 0x310, 0xd0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x5, &(0x7f00000001c0), {[{{@uncond, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x10, @rand_addr=0x39bdcb17, @dev={0xac, 0x14, 0x14, 0x19}, @port=0x4e23, @gre_key=0x1}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x10}, @local, 0x0, 0xffffffff, 'ip6_vti0\x00', 'team_slave_1\x00', {}, {0xff}, 0x7f, 0x2, 0x44}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x5, 0x4, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x6, 0x1, [0x1b, 0x19, 0x1a, 0x4, 0x3b, 0x1d, 0xc, 0xc, 0x22, 0x3c, 0x5, 0x23, 0x7fffffff, 0x2f, 0x35, 0x9], 0x0, 0xfffffffffffffffc, 0xe}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0xffffffffffffff00, 0xffffffff, 0xff, 'ip6gretap0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x0, 0x1, 0x40}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={0x28, 'cgroup\x00', 0x0, {0x6}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @multicast1, @remote, @icmp_id=0x66, @gre_key=0x1ff}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0xb}, @broadcast, 0x0, 0xffffffff, 'veth0\x00', 'veth1\x00', {}, {}, 0xc, 0x3, 0x4}, 0x0, 0x98, 0xd0}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x11, @local, @remote, @port=0x4e22, @icmp_id=0x66}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) r3 = getpgid(0xffffffffffffffff) ptrace$getregset(0x4204, r3, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=""/8, 0x8}) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 666.573030][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 666.578890][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:44:56 executing program 5: 10:44:56 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f00009b2000/0x2000)=nil, 0x2000}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x84000) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000040)=0x3) 10:44:56 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8941, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:56 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x8}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000348000/0x1000)=nil, 0x1000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xfffffe60) read$FUSE(r0, &(0x7f0000002000), 0x46d) socket$bt_cmtp(0x1f, 0x3, 0x5) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) fgetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000140)=""/54, 0x36) write$FUSE_DIRENTPLUS(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000000000000000040000000000000053cb9e877c9b2c5f9c41135180d3f89e88b518b658157c26bca202951b199a80084b2e057356d2bed104ef55b6fee854c927bf99c9"], 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setscheduler(r1, 0x0, &(0x7f0000000080)=0x4a) 10:44:56 executing program 5: 10:44:56 executing program 5: 10:44:56 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x1002000, 0x4) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0xffffffffffffffff, @empty, '\x05rs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\x00'}}) 10:44:56 executing program 5: 10:44:56 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x40000) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x7c61, 0x1ff, 0x6, 0x7, 0x1, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) migrate_pages(r2, 0xbe13, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x7ff) 10:44:56 executing program 5: 10:44:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',groud=\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000880), 0x1000) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0xad, 0x7, &(0x7f0000000640)=[{&(0x7f0000000140)="75137480c82ed9179b2e1aab53e55c3231a7ebd3b2588f69b83faab9c9f212952670f41f7324e1eb7d", 0x29, 0x1}, {&(0x7f00000001c0)="8ba33af0c6f63c098d93af27ebc04720e931a6aa7eca97c9cf8a49a5", 0x1c, 0xfb}, {&(0x7f0000000340)="17d72cb127c4bb5df803015837bccc5520a44d9a2fb16cedef8128689844c6d252af3b2992942f8a0c488bd0471786b7f6918b2b34d419520fa97e0caa275c37ba9a0ed1ec61372cb98c6edfb56e975e8698c61e1eb3375d666da672fb1a0555a42e0323e729bc29cf1139955173882a93f8349313ecb5e5bf391c3cf44a68a0f03178884e2d5c85c81d768357f38c7c79a56983881c046ec122d56b20c600da1a81ea3efb6e18f8", 0xa8, 0x80000001}, {&(0x7f0000000280)="423af7a6303ebc1e227102e2d274b51341a2bbdb4c6c81d34a9db303b03448a7834d764077e404df6b137a206a7d24ccf17bf5769a77fce6f9165e610f0d065f51578401972e753e07606969689557ed45dba08f464f43f92245e146704d02e6e3f06bdd032a1d4f75439aca58a9904946b46cca44545be9394500329a", 0x7d, 0xfa99}, {&(0x7f00000004c0)="6ed4ca369ae693f04c3ce255e738ccef338439d226ea01cc20b98396c9c8a3c639f12270f593c02140f468155cc7b4cb18d8ad2bb6b14d409dafc6e4598ac2917ddb5cb63e5e582b86216b920c9ab8b5ee75cdd9a28af9d77d6f509647828ce04c44319d2647571b002204af", 0x6c, 0xd1d}, {&(0x7f0000000540)="b6f2d0da00bb222abbfa561518c6b7c828c082b690ca640142ab74d96fea379c9b75ad0a7f2ee0dae3a0bed9decf1ea7362bb92660ef4990dd1d42b22c5c4a00a51a7681451ae88fa19c099f8f26", 0x4e, 0xe94}, {&(0x7f00000005c0)="9442687c74dde931c43104e00abb3b9a34a02c53edcd1922a592509b2f1596cd1c2fe59bb48feacccd7235c34bbc70dc4fb806c5e83a2361fc469ac66e3acd3ab7c38c570670e118b12ab91bc72cfabe0456f3dc915af0ce02d9f9d2e1475126c1a7c79128de3c4ab4646fdb241a824ab636f3", 0x73, 0xf}], 0x80000, &(0x7f0000000700)={[{@uni_xlateno='uni_xlate=0'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@rodir='rodir'}, {@utf8='utf8=1'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x7fff}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffffffffffda, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:57 executing program 5: 10:44:57 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8942, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:57 executing program 1: r0 = userfaultfd(0x0) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:57 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000040)='user)\'posix_acl_access\x00', 0x17, 0x3) r1 = shmget$private(0x0, 0x2000, 0x78000000, &(0x7f0000659000/0x2000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000340)=""/228) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000a1b000/0x2000)=nil, &(0x7f00000e4000/0x3000)=nil, &(0x7f00005c9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00004f6000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f000020a000/0x200000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00003a5000/0x4000)=nil, &(0x7f0000000180)="cf8022608ad114e9799c52bc2f6a974cc30cd7701fbce9", 0x17, r0}, 0x68) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x10000, 0x0) write$cgroup_int(r2, &(0x7f0000000140)=0x3, 0x12) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:57 executing program 5: 10:44:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x8401) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:57 executing program 5: 10:44:57 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) 10:44:57 executing program 2: r0 = userfaultfd(0x48) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x80000, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x800, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) pselect6(0x40, &(0x7f0000000000)={0x5, 0xad4, 0x80000001, 0x3, 0x3, 0x4, 0xffffffffffffff81, 0x8}, &(0x7f0000000040)={0x6, 0xb4f6, 0x3915, 0x985, 0xfffffffffffffff8, 0x1, 0x8, 0x8c}, &(0x7f00000000c0)={0x2, 0x9, 0x10000, 0x3ff, 0x81, 0x0, 0x80000001, 0x5}, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={0x1}, 0x8}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000280)={0x0, 0x0, {0x7fffffff, 0xffffffff, 0x2022, 0x4, 0xf, 0x4, 0x3}}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000834000/0x1000)=nil, 0x1000}) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000340)) 10:44:57 executing program 5: 10:44:57 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3ff, 0x40000) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:57 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x8200) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8943, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:58 executing program 5: 10:44:58 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000140)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:58 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f00000c6000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) get_mempolicy(0x0, 0x0, 0x4, &(0x7f000069e000/0x2000)=nil, 0x1) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f00000000c0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6f0c, 0x800) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x0, 0xcf7}, 0x0) 10:44:58 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000467000/0x6000)=nil, 0x6000}) 10:44:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:58 executing program 2: r0 = userfaultfd(0x10000000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x10) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:58 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x100) 10:44:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000080)=0xe8) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000340)={0x6, 0x3, 0x1f, 'queue0\x00'}) open_by_handle_at(r0, &(0x7f00000001c0)={0x4b, 0x0, "60bb1e0d0e98beed2a39e6336cc248cf6426f84829c14d9e1ec706694279bf24f5c06e063905f6065aab0d7b3db8269bd42201a7f3b5e5c964afe4716f7636eb625c81"}, 0x200000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:58 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x200}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8946, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:58 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 10:44:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:58 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) sigaltstack(&(0x7f000030c000/0x4000)=nil, &(0x7f0000000000)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:58 executing program 2: r0 = userfaultfd(0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x901, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000140)={{0xffffffffffffffff, 0x2, 0x9, 0x3, 0xfff}, 0x40, 0xfffffffffffff001}) open_by_handle_at(r1, &(0x7f00000001c0)={0x63, 0x3ff, "454c4efbb7cffa7b6cb9fb638d825e76636fe133feecbd12d53e2bf364260f40356027ddbd3aa27d5072f2a8594aa67a655d75cac23e53a6bc4300e9b45aa5163e4a4a038f746647bb4f56d29038c2cf096cf4b4cc77c85961f4ed"}, 0x10b980) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:58 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005680)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) 10:44:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffbfffffffffffc) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0xf401, 0x0, 0x0, 0x51}, 0x98) 10:44:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() getresuid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000340)) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000001080)={0x0, 0xffffffff}, &(0x7f00000010c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000001100)={r7, 0x1, 0x3ff, 0x1, 0x6482, 0x6}, &(0x7f0000001140)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() sendmsg$nl_route(r6, &(0x7f0000001280)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0xc01}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)=@ipv6_getanyicast={0x14, 0x3e, 0x20, 0x70bd2d, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r2}, {0x2, 0x4, r3}, {0x2, 0x6, r4}, {0x2, 0x1, r5}, {0x2, 0x3, r8}], {0x4, 0x7}, [{0x8, 0x4, r9}, {0x8, 0x4, r10}, {0x8, 0x5, r11}], {0x10, 0x5}, {0x20, 0x1}}, 0x64, 0x3) r12 = syz_open_dev$video4linux(&(0x7f0000000880)='/dev/v4l-subdev#\x00', 0x6, 0x10000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r12, 0x4020565a, &(0x7f0000001180)={0x8001007, 0x1, 0x2}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r12, 0x4020565a, &(0x7f00000008c0)={0x8001003, 0xa, 0x1}) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r13 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900)='/dev/hwrng\x00', 0x1, 0x0) sendmsg$xdp(r13, &(0x7f0000001040)={&(0x7f0000000940)={0x2c, 0x4, r1, 0x27}, 0x10, &(0x7f0000000fc0)=[{&(0x7f0000000980)="9fbdedc601fc7cce41b977c7be16e2109f372eb0364c3b1802063450d839e75a15e90864b7e635d205b8fbc9a2df79b4d157d517ecfe4b44f9c5cc05df9a4091c59398a05436c09a34a9118bc04989df955898ef99156b32961c3fe814dce7a398403e50d5de54eb63e943607ba535f60ddfc32ee8ead8bb109319414b6f734d5a93460abf5e52ab75b65fdda66e6fba02276a007a03d40c746e89ee0b11641421c0fdbda9dd89d8ac9c0c63182b3ad92ec4bde67703c770a501beae8fdc7090e7b5058dbb0d0ab5394b9ae02549e5d03eca93673da2152f1bc3d126a39eee7465cc5ca174e15d16e2bc8dbeff54e6132df4f64ccb820707659fdb", 0xfb}, {&(0x7f0000000a80)}, {&(0x7f0000000ac0)="d3cb4caa7d44c878d31e535e9fdb0301f968fb423eb4a26a16dc796eb2cbc8da04e71222a5c371036562b5d7a6cde174f18f70d3951a254ef96c07c19ef9b68cd8c466697c4f5123e14a8961b080e1b85f99d618cb849e80a177596bf7f0ef2cfe3dbd690b50e13e08b82e1c0a82f688e275dacf71f08c763a9999d632f9c58bcab7dee222c74f64a135be2cf27c5490ba3b1d21f85e019c0b40cf22f21e78f640f40b30934ac452bd4de108bec88612baae95f2e117ed7c49ae9da52b4226da33345cc466df6e225afd4cc6bb41ed0d74f5191eebb90f465ca030c3125dd7e092", 0xe1}, {&(0x7f0000000bc0)="49ff42873772476bdc2c71c3a58281d84b9a4c50527894ddb17df653613919c3a08bd3f0c42b14d243eb6d98dfa1d7c5a803250410a6c8f42909e6da110f4ea3f21d981df3b8189dba38d149d47e2dc4b1441e43a357a9042ce6969fd989a5b4922b54dab2284273b6e0adbad31aff3073cf2caf0839b05f6eab1f9fa5259ad2949ac558f869366f4e0890275aaf740aa42452e872589067", 0x98}, {&(0x7f0000000c80)="e090462dc10444f64572043b784fe7cb1d60e1a4dd2d66c11530a715596d8342e7295a8f53e29292abae970019abd1b3d08e2f8e209cc6e1e091a662bdf06260c6500b837347cd7bd6c0aa2a43da2250059e611d479c21ef013b9c48bb39099b80537eb57871962fc6a63a469f33cd60ff4a9333346c5674b011257d58d0f04e32c1632b5f622447e95db691bf188aacba1147b01c8a1131", 0x98}, {&(0x7f0000000d40)="baf042d4d2239e6c5ce4d05e3c719ef1cb12d9f948b06e784df1b921385bee1a5cb78c2f9e9ea675f20f22c726dbd16156fdeb40148b95255527bc9a91f3b60fa042a1f8c281851fc47d753b47ffcd5b97503b71ad1907a168d9863704dc3471d7e83b17e3940e6dd11acd1627b74b283037", 0x72}, {&(0x7f0000000dc0)="8a6f011ac2db2992efb179c5d9710574a3e1c64a202c7f89a260ba08c6da4f3ca181ff725bd8801234230703f7099bfdb10e4c9899707d04ea98c0c26c40e6ea423b2bdaf464d443b67059805d3da0ad1bbd7c433f0fec869137fac93b388d9a55bc709fadd672333b06755c38bdacc3a0f356c3c77f30a831fef22d3c21560208e156550d764fa19098fb5cbd023e65dfef6e0b16fcf9348cd2fb3876312fe14718b88b479ee0a59811cfb4de70b0dadb699f1196f1fca970ce358538e3fef24420284e3eaa6e187953653f087be19475c4afe8f6b38f8a", 0xd8}, {&(0x7f0000000ec0)="e1e32e0e91a1225de56d809a4058a59550c059214cbe2856455af71e54f7944d0f92210d60b7123c31825eec59ca0ff42c5c1ecc85b21314b6adee2f044518f3ed7cba1fbf47bde1f7bdef592e91db111a7771f9eee2c71cd207f59ed90a9d597752ff99c2576082573dbdc36576422927c6d1d9c67b8968ecdf385a19b5baabd2cf4508bd0efc615a71a5d102b6394d5436bf7a75c3b04bc48240691ee2d2068e0709707d52cf81765f8d61103ad761af1d9e811c531464ca9ddaf226613bc23e37df524404400cb6a8", 0xca}], 0x8, 0x0, 0x0, 0x8004}, 0x4000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:44:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:59 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) 10:44:59 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto(r0, &(0x7f0000000140)="120000001a00e5ef00070017eeac443e3192", 0x12, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:44:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8947, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:44:59 executing program 2: r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r2, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x89}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:59 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f00003d0000/0x3000)=nil, 0x3000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:59 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3ff, 0x40000) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:44:59 executing program 2: r0 = accept(0xffffffffffffff9c, &(0x7f0000000140)=@rc, &(0x7f0000000000)=0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f000001f000/0x4000)=nil, 0x4000}, 0x1}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000200)={0x401, 0x8, 0x0, 0x4, 0x40000000, 0x6c4}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:44:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 670.733021][ C0] net_ratelimit: 22 callbacks suppressed [ 670.733030][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 670.744637][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 670.893021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 670.898902][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 671.613049][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 671.618979][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 671.624804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 671.630555][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 671.636430][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 671.642176][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:45:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000640)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x1000, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="89c4587e", 0x4, 0x6}, {&(0x7f0000000340)="bbbb207bd78d6d0180844cc695be7e336af257ef001a226ca5657b076e1109acc02e902c946f70a37a326453ae9597abacc388afab2b3a120afd59fe000482f0718ca22696f9078b14c88bc86d3d7137340150eb5399484ae898c6e09671551daefe4f17da947d3b5b480c38fb26a04979962ae899b403cc2f7b42f6c262ff1b906b6e6df931a91bcac15ff001d1d64284369c649d06", 0x96, 0x6}, {&(0x7f0000000280)="398ffe913d34ba", 0x7, 0x1}], 0x0, &(0x7f0000000880)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}, {@delalloc='delalloc'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@errors_continue='errors=continue'}, {@resuid={'resuid', 0x3d, r1}}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'rootmode'}}, {@uid_eq={'uid', 0x3d, r3}}, {@context={'context', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0xc52}}, {@appraise_type='appraise_type=imasig'}]}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfsdef={'smackfsdef'}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000400000000000000"], 0x10) 10:45:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00'}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:02 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x40000) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x7c61, 0x1ff, 0x6, 0x7, 0x1, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000548000/0x2000)=nil, 0x3) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) migrate_pages(r2, 0xbe13, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x7ff) 10:45:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8948, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 673.034417][T21621] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 673.172288][T21631] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:45:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00'}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0xfffffffffffffcfa) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0xfffffffffffffffd, 0x1, 0x3, 0x0, 0x0, [{r0, 0x0, 0x5052}, {r0, 0x0, 0x200}, {r0, 0x0, 0x5}]}) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xe, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000007fbffffff0000000800000018000000be0000000000000020000000851d00002c00000065301000f0ffffff9500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1a, &(0x7f00000000c0)=""/26, 0x41100, 0x1, [], r1, 0xf}, 0x48) 10:45:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000080)='./file0/file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8949, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00'}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x1f, 0xea, &(0x7f00000004c0)="0e0dcedeb2b0e6d9a1bf9c61a840d96f83ff68cb09da4ce5aff520fd3dcf030c5399bd2179d32b9a0fe7db7ecce4900682329b178caadb74ebda707373942003b7b7e87d5706497b6b582d341e3d83758f35548dfa1db7977e54dc73a872b52ca96a0a49bca3dc5afb9c20eb2f1c5ea2a5469d40a16c2aaeeeae1a1fc409c4982cf131c7d8c0514183da854b5ebfccc42cbd3b50992b48c07e26380042864e0b6281f469476005dc9e5c9b17f54077a76a705e4c9bb8594878d9c77cb4dbbe42383737aeebf88f58d78278b62a9cf866fe87c54465b740d45b7b9e441a6aa62da76eb19973cfb3a940a5"}) 10:45:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000080)='./file0/file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x894c, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x40, r2, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5a8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3432}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x800) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f0000000800)=0xc) fstat(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000900)={0x1f0, 0x0, 0x5, [{{0x3, 0x1, 0x2, 0x5, 0xffffffff00000001, 0x5, {0x5, 0x6, 0x17, 0x400, 0x7, 0x2, 0x100000001, 0x6, 0x8001, 0xb2c1, 0x2, r3, r4, 0x100000001, 0x1}}, {0x1, 0x80000001, 0x1, 0x7fffffff, '\x9d'}}, {{0x2, 0x3, 0x0, 0x2, 0x5, 0xff, {0x1, 0x7fff, 0x9, 0x1000, 0x4, 0x1f, 0x7, 0x4, 0x81, 0x4, 0xdabd, r5, r6, 0x100000001, 0x9}}, {0x4, 0x6eaa06cb, 0x8, 0x3ff, 'group_id'}}, {{0x0, 0x0, 0xfffffffffffff4b7, 0x5, 0x6, 0x100000001, {0x6, 0x100, 0x2, 0x3, 0x2ed8, 0x0, 0x4f45, 0x1, 0x6, 0x4, 0x3, r7, r8, 0x8, 0x20}}, {0x3, 0x0, 0x1, 0x4, '\x00'}}]}, 0x1f0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000400000000000000"], 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r1, 0x0, 0x8, &(0x7f00000002c0)='rootmode', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r9, r1, 0x0, 0x1, &(0x7f0000000280)='\x00', r10}, 0x30) [ 675.773048][ C0] net_ratelimit: 18 callbacks suppressed [ 675.773057][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 675.784636][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 675.790483][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 675.796267][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 675.802048][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 675.807846][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:45:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8970, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) [ 675.854177][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 675.860838][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:45:05 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0}, 0x20) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x26) write$cgroup_subtree(r2, 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x1ff) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1703) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) openat$cgroup_type(r3, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) [ 676.279118][ T26] audit: type=1804 audit(1549795505.800:61): pid=21768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir721309404/syzkaller.Yk1Nmi/449/memory.events" dev="sda1" ino=16987 res=1 [ 676.327650][ T26] audit: type=1800 audit(1549795505.830:62): pid=21768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16987 res=0 10:45:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000800)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880)={0x0, 0x0}, &(0x7f00000018c0)=0xc) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x7, 0x8, &(0x7f00000005c0)=[{&(0x7f00000001c0)="72a8226064ee83d9e7213d12e0a5ccd44adf904fd175736e445a2fc341245b4c74f169490d8b16ebee10be5832fe4f15c6542a4c9695cc36cea8452184ca31f97dfa5bbba3bc6a12efe3c8ef", 0x4c, 0x6}, {&(0x7f00000000c0)="491691281ed7a1739ce2c6239855b82a640722c19923ac652ffea823", 0x1c}, {&(0x7f0000000140)="a38024ddc8657ea8704fd9e65ac8e4f49422960759f0089d65d1", 0x1a, 0x100}, {&(0x7f0000000880)="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", 0x1000, 0x100}, {&(0x7f0000000280)="5c72c5cb2a5a882f136e330a8c9eb839bb88c5bebd0b55ea4427be9ed0db5e62f86ac6c1d5ba1b1dc723bf317b70288b234020d874d324ac7d9334e1afd2e2ee0d09b6ea244581b40f74ce6c84fb3d86aac9417cb35ead76e4dc9cfe8e6d56ae4e55ce963446000d1d2c8a", 0x6b, 0x3f}, {&(0x7f0000000340)="ff263952ad1c069a2f41b69d092474b7531c8729f7e6bfd5bcec540bd537bcb04f5f88cb14fb6bdb3a88835f84d79ad77654ec0c88aae714f0ea21ee46fbcd48097bfa3778da0e171979d57fb9b53cee1ab1fddf58f8636f5c8ef3e8ca4e989f46b0345525", 0x65, 0x3}, {&(0x7f00000004c0)="4e6c93c003c4713ddfbbda8cde0423219ff2932ff098e246b102c8a46a4ceb3eb5bf554f695ad848f8a97b91a7c657872bc4703b5e5c4d1d3e4f0e5adc115062e8e7b4a7683108dbcdf856706d37cdebbd351bb308e3", 0x56, 0x1}, {&(0x7f0000000540)="73bdf93c4d4a7f570bb97e5e4896c58200810bec1e7966ee5fe3cd365149b0b089385cc7ea0b80106c945ec91e227a0fee3038cf6cda244d5b9b335759cb1eb17ac5", 0x42, 0x9}], 0x2040, &(0x7f0000001900)={[{@barrier_flush='barrier=flush'}, {@noattrs='noattrs'}, {@balloc_notest4='block-allocator=notest4'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'fd'}}, {@euid_lt={'euid<', r1}}, {@uid_eq={'uid', 0x3d, r2}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@appraise='appraise'}]}) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:06 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0}, 0x20) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x26) write$cgroup_subtree(r2, 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x1ff) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1703) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) openat$cgroup_type(r3, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) 10:45:06 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0}, 0x20) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x26) write$cgroup_subtree(r2, 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x1ff) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1703) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) openat$cgroup_type(r3, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) [ 676.973003][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 676.978816][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 677.170362][ T26] audit: type=1804 audit(1549795506.690:63): pid=21809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir721309404/syzkaller.Yk1Nmi/450/memory.events" dev="sda1" ino=16984 res=1 [ 677.242816][ T26] audit: type=1800 audit(1549795506.690:64): pid=21809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16984 res=0 10:45:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8971, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) [ 677.296795][ T26] audit: type=1804 audit(1549795506.800:65): pid=21810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir557073725/syzkaller.0ZF3Vq/450/memory.events" dev="sda1" ino=16987 res=1 [ 677.325560][ T26] audit: type=1800 audit(1549795506.800:66): pid=21810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16987 res=0 10:45:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8927, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:07 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0}, 0x20) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x26) write$cgroup_subtree(r2, 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x1ff) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1703) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) openat$cgroup_type(r3, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) 10:45:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 677.980988][ T26] audit: type=1804 audit(1549795507.500:67): pid=21839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir721309404/syzkaller.Yk1Nmi/451/memory.events" dev="sda1" ino=16994 res=1 [ 678.037544][ T26] audit: type=1800 audit(1549795507.540:68): pid=21839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16994 res=0 10:45:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) 10:45:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:08 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) socketpair(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0}, 0x20) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x26) write$cgroup_subtree(r2, 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000440)='syz1\x00', 0x1ff) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1703) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) openat$cgroup_type(r3, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) socketpair(0x0, 0x4, 0x0, 0x0) 10:45:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 678.871636][ T26] audit: type=1804 audit(1549795508.390:69): pid=21870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir721309404/syzkaller.Yk1Nmi/452/memory.events" dev="sda1" ino=16994 res=1 [ 678.919779][ T26] audit: type=1800 audit(1549795508.430:70): pid=21870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16994 res=0 10:45:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) 10:45:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8981, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x7d2, 0x80000000, 0x9, 0x100000000}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={r1, 0xc0, &(0x7f0000000340)=[@in={0x2, 0x4e22, @empty}, @in={0x2, 0x40, @multicast1}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x7, @remote, 0x1d9a}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, @in6={0xa, 0x4e22, 0x9, @empty, 0x3f2}, @in6={0xa, 0x4e22, 0xfff, @rand_addr="e9be4eb6a2de410e277d734b1da6388a", 0x40}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x81, @remote, 0x20}]}, &(0x7f0000000140)=0x10) 10:45:09 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) 10:45:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="9a000000000000000000a97f8ed68d84796de9fea0dc47bc4622dd3afa7c6d8c122b170353ceb6335df69af598e55ee1557d933ddfd488f407add797070c61a42ff6500d4765e19e063e7f5ebbdaef69720b9b0fb874ad5627778b88778faf1dd7aa65d467f93c5f75fd5d5db978f3b0f2bc74da273f5e70", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0xffffffffffffff4c, 0xfffffffffffffffb, 0x4, 0x7fff, 0x80000000, 0x3, 0x3f, 0x91d, 0x1b4, 0x40, 0xd9, 0x0, 0x377f, 0x38, 0x1, 0x6, 0xe0a4, 0x6}, [{0x1, 0x10001, 0x5, 0xd3f6, 0x8, 0x5, 0x9, 0x6}, {0x0, 0x5, 0x5, 0x7, 0x8001, 0x7ff, 0x1000, 0x8bf}], "df05e96bed2f26953a652f057341d0558b35b6f0236acc1b02e480a0a5dd672ed0d0c15cd56f2c6a9770fe65d5409ac46a6fab955d0b8a276752b17c785bf0c3e1de0d5d0d98d486dc872241554d95d33d904e2265aac93c8e04a92dc69005ae7309beb5e8dd0f478c6da48dfce1f94e83b5437c524f5b744f49c3b5012c744b4b", [[], [], [], [], [], [], [], [], [], []]}, 0xb31) 10:45:10 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(r1, 0x10, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/s\x01\x001\x00\xd1\x85\xa9\x91\x04\x98\xde\x94\xb8\xd8\x83\xa8\xa0\xef\xac\xb3\xbf\x1c\x94\xf0\xf8O\x93\xf6?a\'\xc6\xad\a\xbf\x85\xb8\xa8\xf7\xc5=\x89\x00\x00`\xf5\xd4p\xcd\xfe\xed\xc0c\x88q\x86u\xa7\xf1\xe3\x80\xe6_\x8b\xdb\xe2\xe3\xd5\xdd\x87\x1a\x9a=\f\x95B\xbaiK\xb9/\xa9I?\r/\xe3\xe7\x11\x89\xddy\xaba\xcd\xedI\xa0\x8d\x91H', 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000680)={{0x0, 0x6, 0x8, 0x0, 'syz0\x00', 0x2}, 0x3, 0x124, 0x8001, 0x0, 0x0, 0x2, 'syz1\x00', 0x0, 0x0, [], [0x20, 0x1ff, 0x101, 0xba2e]}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x5, 0x0, 0x101, 0x80, 0x0, 0x0, 0x1108}, 0x0) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f00000002c0)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000480)=0x220, 0x4) signalfd4(r3, &(0x7f0000000380)={0x7}, 0x8, 0x80000) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000004c0)={0x8, 0x0, {0x1, 0x3, 0x59af}}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r5 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) read(r5, &(0x7f0000000140)=""/117, 0x75) socket$unix(0x1, 0x2, 0x0) 10:45:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8982, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r1, &(0x7f00000040c0), 0x1109) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchmod(r0, 0x40) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) [ 681.133037][ C0] net_ratelimit: 22 callbacks suppressed [ 681.133045][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 681.144639][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:45:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) [ 681.303132][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 681.308952][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:45:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:11 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r1, 0x9) fcntl$getownex(r1, 0x10, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/s\x01\x001\x00\xd1\x85\xa9\x91\x04\x98\xde\x94\xb8\xd8\x83\xa8\xa0\xef\xac\xb3\xbf\x1c\x94\xf0\xf8O\x93\xf6?a\'\xc6\xad\a\xbf\x85\xb8\xa8\xf7\xc5=\x89\x00\x00`\xf5\xd4p\xcd\xfe\xed\xc0c\x88q\x86u\xa7\xf1\xe3\x80\xe6_\x8b\xdb\xe2\xe3\xd5\xdd\x87\x1a\x9a=\f\x95B\xbaiK\xb9/\xa9I?\r/\xe3\xe7\x11\x89\xddy\xaba\xcd\xedI\xa0\x8d\x91H', 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000680)={{0x0, 0x6, 0x8, 0x0, 'syz0\x00', 0x2}, 0x3, 0x124, 0x8001, 0x0, 0x0, 0x2, 'syz1\x00', 0x0, 0x0, [], [0x20, 0x1ff, 0x101, 0xba2e]}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x5, 0x0, 0x101, 0x80, 0x0, 0x0, 0x1108}, 0x0) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f00000002c0)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000480)=0x220, 0x4) signalfd4(r3, &(0x7f0000000380)={0x7}, 0x8, 0x80000) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000004c0)={0x8, 0x0, {0x1, 0x3, 0x59af}}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r5 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) read(r5, &(0x7f0000000140)=""/117, 0x75) socket$unix(0x1, 0x2, 0x0) 10:45:11 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) [ 682.023056][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 682.028960][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 682.034827][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 682.040591][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 682.046446][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 682.052215][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:45:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x181880) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000004c0)=""/249) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = epoll_create(0x97f) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80, 0x0) 10:45:11 executing program 1: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x109000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x7}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x4, 0x0) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x44000, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10001f000000649b055c130d00000400"], 0x10) 10:45:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8990, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f57746d6f64073d30303030303030303030303081b1d3303030d72737fb546b302c757365725f00000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) read(r1, &(0x7f0000000040)=""/11, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_pts(r1, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$TCFLSH(r4, 0x541f, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, 0x0, 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8992, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0xfffffffffffffe42, 0x2, 0x4}, 0x10) 10:45:14 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, 0x0, 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x101000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2408200}, 0xc, &(0x7f0000000140)={&(0x7f0000000880)={0x384, r2, 0x402, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xf0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff6ae9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x39c4}]}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4000000000000}]}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6d75}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xfd6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffe1}]}, @TIPC_NLA_LINK={0x100, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffc7f5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x986}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x19}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x384}, 0x1, 0x0, 0x0, 0x4001}, 0x10) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, 0x0, 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xffffffffffffffda, 0x5}, 0x10) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:15 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) [ 686.184090][ C0] net_ratelimit: 18 callbacks suppressed [ 686.184117][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 686.195827][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 686.202727][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 686.209208][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 686.216567][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 686.223119][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 686.253058][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 686.258871][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:45:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8993, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30060000003030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pipe(&(0x7f0000000040)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENT(r1, &(0x7f00000001c0)={0x70, 0xffffffffffffffda, 0x2, [{0x6, 0x2, 0x2, 0x6, 'fd'}, {0x5, 0x1, 0x9, 0x3, '*vboxnet0'}, {0x3, 0x2, 0x0, 0x7}]}, 0x70) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:16 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:16 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffa) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d1f9b71215e8c6efa6e2b876fcfd380aa646529dcdb39f2ad335a91c173acc572201586b3653f71bbaf23e8c1bea9a517ec9eb82dd7a48091d148835b83d1addacd9f8bc5775425aaab256e66ba456b6335d5dfd2581da4c72e8f5d4c3faced4a4a21a527179c26beafa2cc9e413c86cf62c8130e91001e9b36b3f81dfa6aa4ad385a903f1e27d899d289a6ccba7b7b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x2982, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000280)=""/52) r2 = getpid() syz_open_procfs(r2, &(0x7f00000001c0)='children\x00') write$FUSE_STATFS(r0, &(0x7f0000000080)={0x60, 0x0, 0x4, {{0x1f, 0x10001, 0x8, 0x8, 0x5, 0x7ff, 0xffffffffffffff81, 0xf0bd}}}, 0x60) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f00000002c0)="0640610b7195ee6946391db68e888d8e5e283f5e695e3557", 0x18) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfffffffffffffff9, 0x10000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000340)={0x2, 0xe4052d39eb2f4be5, 'client0\x00', 0xffffffff80000006, "a1b3cdfc983f2c45", "70843c1d7e6734c2e5f7859531187273c8f5fe6175a77f08083a82f2e8cd8c1e", 0x9, 0x1}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000140)={0x3, 0xffffffffffffff9c}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id<', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x9, 0x17, 0xffff, 0x81, 0x0, 0x10001, 0x5, 0xc, 0xb18, 0x3, 0x1, 0x1000, 0xfff, 0x5, 0x3, 0x10000, 0x1f, 0x3, 0x25, 0x9, 0x8, 0x7, 0x7, 0x9, 0x1, 0x3, 0x6, 0xff, 0x401, 0x100000001, 0x3d9, 0x7, 0x1, 0x7, 0x3d5, 0x0, 0x0, 0x81, 0x6, @perf_config_ext={0x7, 0x7}, 0x20, 0x4, 0x864, 0x5, 0xdf6, 0x10001, 0x9}, r1, 0x1, 0xffffffffffffffff, 0x8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) [ 687.373034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 687.378892][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:45:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="66643da3079864b3f262d62102000000dee9d53e3da281270000000000000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8994, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x200, 0x8, 0xffff, 0x2, 0x7, 0x3ff}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x1, &(0x7f0000000140)=0x2) read$FUSE(r0, &(0x7f0000000880), 0x1000) personality(0x4100001) 10:45:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:17 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="90c269fc2e10c9efe8d86617596d18205c024375529e52ace7c4f91f8fa8a238017ccca1da6903410707bb936d0f3b8253c98b636e109affbfd4474a177b2d73051723ce406f14e20b088cdb6043895c8efc1b6d0703c228ffb09c0ec4fb31c67e6e20a26e2ca35bbb626e754aa89686cf09c805f878aec6714b76976eba914c7a9f42e7b63ab674d25db8518036a72c8d58b3d967da13729e625b74aecc529d650431b951", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000080)={0xffffffffffff8000, 0x0, 0x3ff}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="10000000000000000497a783176200f6bc4c946d96bfee4f3410e5e93a9c9f20405aa6afbf5ff8c894513411126145256fe769079f7fd2000000000000000000000000"], 0x10) 10:45:17 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0xc0000) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)={@local, @local, 0x0}, &(0x7f0000000080)=0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@local, @remote, @mcast2, 0x8000, 0x7, 0x458, 0x400, 0x9, 0x100, r2}) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000400000100000000"], 0x10) 10:45:17 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:17 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000140)=0x6b85) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0400caf01bb718595c1d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r3, 0x4}, &(0x7f0000000340)=0x8) read$FUSE(r1, &(0x7f0000003000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x3}, 0x10) write$FUSE_POLL(r1, &(0x7f0000000040)={0x18, 0x0, 0x2, {0x1}}, 0x18) chdir(&(0x7f0000000480)='./file0\x00') rt_sigaction(0x35, &(0x7f0000000440)={&(0x7f00000003c0)="211c0b3ef0408098000000000a410f01fcf3dbc38fe98096bc2300000000dcea4119bc29eb370000660f38f6745c32c4217950ef650fd21dfcbf46db", {0x3}, 0x10000000, &(0x7f0000000400)="c4a32d38ce95c4013bd075e7c4c28d09e1c4e1f91150dff30f183767410fd7da67460f59bd04000000f0418122226ea05dc441d15d44d935c4831d6d3000"}, &(0x7f0000000580)={&(0x7f00000004c0)="43dc90feefffff40a7f243e100660ff9490bc4229da71e3664f20f127e31c402d1a72fc4c215ac49d3c481f97ea0feefffff8f8978803f", {}, 0x0, &(0x7f0000000500)="c4a3cd404893f247d9ffc4a1a567e4c461f97e4c8a00362ef2d8a1f5d40000f0420fc78c280d00000066400f29f4f28c819f000000c42281b77b00c4e2d59044f7df"}, 0x8, &(0x7f00000005c0)) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="374e8783dea2dd86e19c9ce0ad2d3f0008033364135608f616280333f7da", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="100000000000f0ff030000000000000001b392ccbd431ed4"], 0x10) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0xffffffffffffffda, 0x4, {0x0, 0x2}}, 0x1) 10:45:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = getuid() mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x1004000, &(0x7f0000000140)={[{@xino_on='xino=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}], [{@pcr={'pcr', 0x3d, 0xd}}, {@euid_gt={'euid>', r0}}, {@smackfsdef={'smackfsdef', 0x3d, 'em1mime_typelo[mime_type\x9cvmnet1self,wlan0loGPLsecurity@'}}]}) syz_mount_image$f2fs(&(0x7f00000003c0)='f2fs\x00', &(0x7f00000004c0)='./file0\x00', 0x1, 0x4, &(0x7f0000000740)=[{&(0x7f0000000500)="50d6a67c832ed9c48042898e4f5c076d888aa7b9f523a251e7b03ec896bfe10e5eadf9a4048ca4799cdf7b3932f1d3e18426367b631bc2abad4d44a71e237944e648fb479d078b5e478d261ae96600cb74e8e4", 0x53, 0x2}, {&(0x7f0000000880)="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", 0x1000, 0x401}, {&(0x7f0000000580)="b28216a9c4f878c12c1739cad3eff686ffc32ba0f53a2170fa2a452b313e45adeec8fa7dd574cb36cad6b1c2dbad88ae810a0e2fb204d981c8c6b2c3f93ccb194b5e560c2c2dc0446dcb91b50a52394a54aeecaf5d9b5eb6caf697e7bdbf60873c1ed320f3569c7ecb96878f6d99bb985bcef018c51f278f6a39d67a3daa73f398f8a73ba5bc59b1a2473d39960f439af7e8f18182433117a271a5a41e80b80323b7761dd3c79497d2f3bb3117eba71e193c19f924cb7bdf229dbb98feebc14c55811b6e524ed9615487789ebb4763ebf0d895dab29cde848cecbd0260a866c43d3a4e4a", 0xe4, 0x80000000}, {&(0x7f0000000680)="37e42ed5e465d378b9f72494e237e85e83283db6ff00e241d71530f0c0700a117e3c8fe5140a2284413e1203a2ce29e39e435ee63a39e5f898f9ab1f7e415e51baec543182accb047e041f6b3bc1ba51fcc28aca2b397e2fee6045296995b69c3e85604d69bc2115c4fac8ed3e734612032e0738ed23e6bf62527bee46dd35b13dac1ea38dc42d9bfdd6f7b949d799f524a2324dcc815bf74f2121dbe3c33b584afc0bfaa80f894b58f0f53a1a12c8100675005a37aa991d1fefaa", 0xbb, 0x9}], 0x0, &(0x7f0000001880)={[{@discard='discard'}, {@noacl='noacl'}, {@inline_dentry='inline_dentry'}, {@discard='discard'}, {@prjquota={'prjquota', 0x3d, 'fuse\x00'}}], [{@obj_type={'obj_type', 0x3d, '\xc0eth0vboxnet0\'lo\'@'}}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x36, 0x34, 0x34, 0x7d, 0x33, 0x37, 0x33], 0x2d, [0x37, 0x66, 0x37], 0x2d, [0x62, 0x31, 0x61, 0x34], 0x2d, [0x0, 0x0, 0x77, 0x65], 0x2d, [0x35, 0x73, 0x30, 0x7f, 0x73, 0x7b, 0x33, 0x77]}}}, {@fowner_eq={'fowner', 0x3d, r0}}]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dsp\x00', 0x10100, 0x0) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000800)=0x9, 0x4) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r3 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x4, 0x4042) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x33) r4 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f0000000280)={0x0, 0x1c, [0xfffffffffffffffb, 0x10001, 0x6, 0xfffffffffffffff8, 0x59, 0xc618, 0x101]}) r5 = dup2(r1, r1) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) [ 688.733377][T22327] overlayfs: unrecognized mount option "pcr=00000000000000000013" or missing value [ 688.777771][T22327] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 688.811063][T22327] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 688.860962][T22327] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 688.870426][T22327] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 10:45:18 executing program 1: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x109000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) chdir(&(0x7f0000000480)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x7}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 10:45:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8995, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:18 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:18 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:45:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) 10:45:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xa, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(r7, 0xffffffffffffffff, 0x0) 10:45:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket(0x10, 0x80002, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) bind$netlink(r2, &(0x7f0000177ff4), 0xc) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$security_smack_entry(0x0, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8880, 0x0) fanotify_mark(r4, 0x79, 0x8000020, r5, &(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x3, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r6, 0x7ff, 0x4, 0x3}, 0x10) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000340), 0x2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000002c0)={0x0, 0x7}) listen(r3, 0x0) accept4(r3, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80001, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000080)='/dev/ptmx\x00', 0xa) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 691.533079][ C0] net_ratelimit: 22 callbacks suppressed [ 691.533088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 691.544559][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 691.693040][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 691.698990][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 692.413063][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 692.419019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 692.424822][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 692.430592][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 692.436449][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 692.442233][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 696.573068][ C0] net_ratelimit: 18 callbacks suppressed [ 696.573073][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 696.584541][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 696.590428][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 696.596216][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 696.602002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 696.607794][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 696.653109][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 696.658932][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 697.773140][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 697.779024][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 701.933057][ C0] net_ratelimit: 22 callbacks suppressed [ 701.933063][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 701.944500][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 702.093091][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.099008][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 702.813032][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.818865][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 702.824789][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.830565][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 702.836384][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.842141][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 706.973120][ C0] net_ratelimit: 18 callbacks suppressed [ 706.979141][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 706.985095][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 706.990924][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 706.996780][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 707.002643][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 707.008456][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 707.053069][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 707.059070][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 708.173013][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 708.178958][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 712.333100][ C0] net_ratelimit: 22 callbacks suppressed [ 712.338788][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 712.344588][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 712.493059][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 712.498884][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 713.213079][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 713.219273][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 713.225166][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 713.231063][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 713.237184][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 713.243017][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 717.373033][ C0] net_ratelimit: 18 callbacks suppressed [ 717.378938][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.384762][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 717.390591][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.396369][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 717.402189][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.407960][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 717.453128][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.459100][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 718.573080][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 718.579224][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 722.733134][ C0] net_ratelimit: 22 callbacks suppressed [ 722.733141][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 722.745010][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 722.893080][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 722.899025][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 723.612999][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 723.618801][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 723.624679][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 723.630442][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 723.636289][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 723.642025][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 727.773042][ C0] net_ratelimit: 18 callbacks suppressed [ 727.779030][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 727.784834][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 727.790614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 727.796341][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 727.802096][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 727.807829][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 727.853064][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 727.859035][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 728.973023][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 728.978969][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 733.133068][ C0] net_ratelimit: 22 callbacks suppressed [ 733.133074][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 733.144513][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 733.293043][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 733.298990][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 734.013051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 734.018992][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 734.024801][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 734.030723][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 734.036515][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 734.042236][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 738.173019][ C0] net_ratelimit: 18 callbacks suppressed [ 738.178755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.184508][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 738.190276][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.195998][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 738.201768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.207565][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 738.253131][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.258971][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 739.373017][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 739.378826][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 743.533122][ C0] net_ratelimit: 22 callbacks suppressed [ 743.538866][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 743.544676][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 743.693095][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 743.699209][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 744.413083][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 744.419066][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 744.424901][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 744.430684][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 744.436646][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 744.442453][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 748.573086][ C0] net_ratelimit: 18 callbacks suppressed [ 748.578779][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 748.584596][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 748.590410][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 748.596167][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 748.601949][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 748.607707][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 748.653029][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 748.658881][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 749.773045][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 749.779000][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 753.933038][ C0] net_ratelimit: 22 callbacks suppressed [ 753.933044][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 753.944584][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 754.093073][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.099098][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 754.813040][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.819079][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 754.825054][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.830820][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 754.836624][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.842359][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 758.973099][ C0] net_ratelimit: 18 callbacks suppressed [ 758.973106][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 758.984934][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 758.990715][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 758.996513][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 759.002300][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 759.008219][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 759.053109][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 759.059146][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 760.173049][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 760.178983][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 764.333112][ C0] net_ratelimit: 18 callbacks suppressed [ 764.338910][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.344721][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 764.493119][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.498990][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 765.213081][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.219165][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 765.225034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.230821][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 765.236654][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.242425][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 769.373037][ C0] net_ratelimit: 18 callbacks suppressed [ 769.379071][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 769.384875][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 769.390717][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 769.396624][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 769.402538][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 769.408346][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 770.413098][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 770.418980][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 770.573084][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 770.579074][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 774.573082][ C0] net_ratelimit: 20 callbacks suppressed [ 774.573089][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.584568][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 774.733152][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.739122][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 774.893083][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.899020][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 775.613071][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 775.619088][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 775.625118][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 775.630907][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 779.773115][ C0] net_ratelimit: 20 callbacks suppressed [ 779.773122][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 779.785016][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 779.790809][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 779.796602][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 779.802644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 779.808466][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 780.813099][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 780.819092][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 780.973092][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 780.978969][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 784.973103][ C0] net_ratelimit: 20 callbacks suppressed [ 784.978964][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 784.984784][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.133130][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.139068][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.293064][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.299108][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 786.013076][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 786.018926][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 786.024778][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 786.030525][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.173038][ C0] net_ratelimit: 20 callbacks suppressed [ 790.178796][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.184606][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.190415][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.196198][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.201972][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.207713][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 791.213067][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 791.219080][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 791.373084][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 791.379080][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 795.373061][ C0] net_ratelimit: 20 callbacks suppressed [ 795.378820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.384609][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 795.533099][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.539007][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 795.693058][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.698992][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 796.413118][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.419006][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 796.424860][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.430633][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 800.573083][ C0] net_ratelimit: 20 callbacks suppressed [ 800.578816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 800.584598][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 800.590420][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 800.596192][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 800.602066][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 800.607807][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 801.613017][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 801.618848][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 801.773063][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 801.778909][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 805.773118][ C0] net_ratelimit: 20 callbacks suppressed [ 805.778860][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 805.784685][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 805.933067][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 805.939131][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 806.093080][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 806.098920][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 806.813094][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 806.819012][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 806.824878][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 806.830634][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 810.973143][ C0] net_ratelimit: 20 callbacks suppressed [ 810.973150][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 810.984998][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 810.990806][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 810.996706][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 811.002677][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 811.008634][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 812.013077][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 812.018913][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 812.173096][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 812.179090][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.183093][ C0] net_ratelimit: 20 callbacks suppressed [ 816.183115][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.194597][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.333106][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.339032][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.493109][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.499070][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 817.213053][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 817.219079][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 817.224964][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 817.230695][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 821.373123][ C0] net_ratelimit: 20 callbacks suppressed [ 821.378980][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 821.384996][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 821.390830][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 821.396609][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 821.402592][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 821.408621][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 822.413096][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 822.418989][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 822.573123][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 822.579017][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 826.573094][ C0] net_ratelimit: 20 callbacks suppressed [ 826.578920][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 826.584706][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 826.733099][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 826.738996][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 826.893076][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 826.898982][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 827.613058][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 827.618914][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 827.624863][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 827.630624][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 831.773098][ C0] net_ratelimit: 20 callbacks suppressed [ 831.778806][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 831.784612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 831.790442][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 831.796203][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 831.802422][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 831.808334][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 832.813034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 832.819121][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 832.973065][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 832.979189][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 836.973096][ C0] net_ratelimit: 20 callbacks suppressed [ 836.978804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 836.984768][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 837.133163][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 837.139002][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 837.293095][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 837.299084][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 838.013030][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 838.018991][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 838.024879][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 838.030613][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 842.173044][ C0] net_ratelimit: 20 callbacks suppressed [ 842.173051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 842.184653][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 842.190463][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 842.196273][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 842.202064][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 842.207851][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 843.213092][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 843.218948][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 843.373134][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 843.378997][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 847.373119][ C0] net_ratelimit: 20 callbacks suppressed [ 847.378972][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 847.385001][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 847.533126][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 847.539242][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 847.693002][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 847.698851][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 848.413026][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 848.419019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 848.424869][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 848.430782][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 851.133232][ T1041] INFO: task syz-executor.3:22327 blocked for more than 140 seconds. [ 851.141609][ T1041] Not tainted 5.0.0-rc5-next-20190208 #31 [ 851.147929][ T1041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 851.156631][ T1041] syz-executor.3 D27696 22327 7677 0x00000004 [ 851.163017][ T1041] Call Trace: [ 851.166302][ T1041] __schedule+0x817/0x1cc0 [ 851.170730][ T1041] ? __sched_text_start+0x8/0x8 [ 851.175795][ T1041] ? wait_woken+0x250/0x250 [ 851.180302][ T1041] schedule+0x92/0x180 [ 851.184584][ T1041] request_wait_answer+0x42f/0x7c0 [ 851.189693][ T1041] ? queue_interrupt+0x440/0x440 [ 851.194823][ T1041] ? finish_wait+0x260/0x260 [ 851.199545][ T1041] ? kasan_check_read+0x11/0x20 [ 851.204465][ T1041] ? do_raw_spin_unlock+0x57/0x270 [ 851.209628][ T1041] __fuse_request_send+0x12b/0x1d0 [ 851.215011][ T1041] fuse_request_send+0x60/0xa0 [ 851.219760][ T1041] fuse_simple_request+0x2f6/0x730 [ 851.224921][ T1041] fuse_do_getattr+0x24b/0xc80 [ 851.229689][ T1041] ? time_to_jiffies.part.0+0xf0/0xf0 [ 851.235239][ T1041] ? lockref_get_not_dead+0x70/0x90 [ 851.240459][ T1041] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 851.246768][ T1041] fuse_perm_getattr+0x3d/0x60 [ 851.251519][ T1041] fuse_permission+0x3d5/0x530 [ 851.256636][ T1041] ? fuse_getattr+0x360/0x360 [ 851.261400][ T1041] inode_permission+0x36d/0x570 [ 851.266339][ T1041] link_path_walk.part.0+0x9d6/0x1340 [ 851.271740][ T1041] ? walk_component+0x2000/0x2000 [ 851.276825][ T1041] path_parentat.isra.0+0x51/0x160 [ 851.282015][ T1041] filename_parentat.isra.0+0x19c/0x410 [ 851.287644][ T1041] ? getname+0x20/0x20 [ 851.291795][ T1041] ? find_held_lock+0x35/0x130 [ 851.296768][ T1041] ? kasan_check_write+0x14/0x20 [ 851.301752][ T1041] ? lock_downgrade+0x880/0x880 [ 851.306688][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.312949][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.319276][ T1041] ? check_preemption_disabled+0x48/0x290 [ 851.325083][ T1041] ? check_stack_object+0x114/0x160 [ 851.330439][ T1041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.336771][ T1041] filename_create+0xb3/0x4f0 [ 851.341511][ T1041] ? kern_path_mountpoint+0x40/0x40 [ 851.347195][ T1041] ? strncpy_from_user+0x2a8/0x380 [ 851.352313][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.358626][ T1041] ? getname_flags+0x277/0x5b0 [ 851.363422][ T1041] do_mkdirat+0xb5/0x2a0 [ 851.367766][ T1041] ? __ia32_sys_mknod+0xb0/0xb0 [ 851.372617][ T1041] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 851.378153][ T1041] ? do_syscall_64+0x26/0x610 [ 851.382984][ T1041] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.389039][ T1041] ? do_syscall_64+0x26/0x610 [ 851.393866][ T1041] __x64_sys_mkdirat+0x76/0xb0 [ 851.398638][ T1041] do_syscall_64+0x103/0x610 [ 851.403387][ T1041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.409285][ T1041] RIP: 0033:0x457e39 [ 851.413227][ T1041] Code: 44 24 18 00 00 00 00 e8 a5 b0 fc ff 48 8b 44 24 38 48 89 04 24 e8 d7 77 fb ff 48 8b 6c 24 40 48 83 c4 48 c3 48 89 d1 eb 90 e8 <73> 20 00 00 e9 7e fe ff ff cc cc cc cc cc cc cc cc cc cc cc cc cc [ 851.433007][ T1041] RSP: 002b:00007f7d6b7a9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 851.441581][ T1041] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 851.449682][ T1041] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 851.457815][ T1041] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 851.465955][ T1041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d6b7aa6d4 [ 851.474117][ T1041] R13: 00000000004c3b44 R14: 00000000004d6bb0 R15: 00000000ffffffff [ 851.482104][ T1041] INFO: task syz-executor.3:22334 blocked for more than 140 seconds. [ 851.490343][ T1041] Not tainted 5.0.0-rc5-next-20190208 #31 [ 851.496833][ T1041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 851.505716][ T1041] syz-executor.3 D28384 22334 7677 0x00000004 [ 851.512056][ T1041] Call Trace: [ 851.515509][ T1041] __schedule+0x817/0x1cc0 [ 851.519984][ T1041] ? __sched_text_start+0x8/0x8 [ 851.524935][ T1041] ? wait_woken+0x250/0x250 [ 851.529443][ T1041] schedule+0x92/0x180 [ 851.533877][ T1041] request_wait_answer+0x42f/0x7c0 [ 851.539002][ T1041] ? queue_interrupt+0x440/0x440 [ 851.544124][ T1041] ? finish_wait+0x260/0x260 [ 851.548769][ T1041] ? kasan_check_read+0x11/0x20 [ 851.553760][ T1041] ? do_raw_spin_unlock+0x57/0x270 [ 851.558866][ T1041] __fuse_request_send+0x12b/0x1d0 [ 851.564053][ T1041] fuse_request_send+0x60/0xa0 [ 851.568930][ T1041] fuse_simple_request+0x2f6/0x730 [ 851.574115][ T1041] fuse_do_getattr+0x24b/0xc80 [ 851.578991][ T1041] ? time_to_jiffies.part.0+0xf0/0xf0 [ 851.584429][ T1041] ? lockref_get_not_dead+0x70/0x90 [ 851.589654][ T1041] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 851.595964][ T1041] fuse_perm_getattr+0x3d/0x60 [ 851.600783][ T1041] fuse_permission+0x3d5/0x530 [ 851.605621][ T1041] ? fuse_getattr+0x360/0x360 [ 851.610355][ T1041] inode_permission+0x36d/0x570 [ 851.615268][ T1041] link_path_walk.part.0+0x9d6/0x1340 [ 851.620640][ T1041] ? walk_component+0x2000/0x2000 [ 851.625815][ T1041] ? cache_grow_begin.cold+0x2d/0x31 [ 851.631114][ T1041] path_lookupat.isra.0+0xe3/0x8d0 [ 851.636297][ T1041] ? path_parentat.isra.0+0x160/0x160 [ 851.641672][ T1041] ? cache_grow_end+0xa4/0x190 [ 851.646547][ T1041] ? find_held_lock+0x35/0x130 [ 851.651301][ T1041] ? cache_grow_end+0xa4/0x190 [ 851.656147][ T1041] filename_lookup+0x1b0/0x410 [ 851.661006][ T1041] ? nd_jump_link+0x1d0/0x1d0 [ 851.665745][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.671975][ T1041] ? check_preemption_disabled+0x48/0x290 [ 851.677830][ T1041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.684129][ T1041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.690413][ T1041] ? __phys_addr_symbol+0x30/0x70 [ 851.695729][ T1041] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 851.701501][ T1041] ? __check_object_size+0x3d/0x42f [ 851.706777][ T1041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.713030][ T1041] ? strncpy_from_user+0x2a8/0x380 [ 851.718144][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.724554][ T1041] ? getname_flags+0x277/0x5b0 [ 851.729342][ T1041] user_path_at_empty+0x43/0x50 [ 851.734353][ T1041] do_mount+0x150/0x2c40 [ 851.738706][ T1041] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 851.744933][ T1041] ? copy_mount_string+0x40/0x40 [ 851.749865][ T1041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.756174][ T1041] ? _copy_from_user+0xdd/0x150 [ 851.761047][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.767683][ T1041] ? copy_mount_options+0x30e/0x440 [ 851.773141][ T1041] ksys_mount+0xdb/0x150 [ 851.777924][ T1041] __x64_sys_mount+0xbe/0x150 [ 851.782607][ T1041] do_syscall_64+0x103/0x610 [ 851.787318][ T1041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.793252][ T1041] RIP: 0033:0x457e39 [ 851.797205][ T1041] Code: 44 24 18 00 00 00 00 e8 a5 b0 fc ff 48 8b 44 24 38 48 89 04 24 e8 d7 77 fb ff 48 8b 6c 24 40 48 83 c4 48 c3 48 89 d1 eb 90 e8 <73> 20 00 00 e9 7e fe ff ff cc cc cc cc cc cc cc cc cc cc cc cc cc [ 851.816985][ T1041] RSP: 002b:00007f7d6b767c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 851.825445][ T1041] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457e39 [ 851.833648][ T1041] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000000000000 [ 851.841720][ T1041] RBP: 000000000073c040 R08: 0000000020000140 R09: 0000000000000000 [ 851.849817][ T1041] R10: 0000000001004000 R11: 0000000000000246 R12: 00007f7d6b7686d4 [ 851.858001][ T1041] R13: 00000000004c3c88 R14: 00000000004d6e38 R15: 00000000ffffffff [ 851.866046][ T1041] [ 851.866046][ T1041] Showing all locks held in the system: [ 851.873826][ T1041] 1 lock held by khungtaskd/1041: [ 851.878849][ T1041] #0: 0000000061d4291d (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 851.888506][ T1041] 1 lock held by rsyslogd/7542: [ 851.893514][ T1041] #0: 0000000060d2b309 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 851.902125][ T1041] 2 locks held by getty/7633: [ 851.906985][ T1041] #0: 00000000e48e2950 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 851.916125][ T1041] #1: 00000000b394c083 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 851.925758][ T1041] 2 locks held by getty/7634: [ 851.930439][ T1041] #0: 00000000600d8513 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 851.939643][ T1041] #1: 000000008813df0e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 851.949504][ T1041] 2 locks held by getty/7635: [ 851.954225][ T1041] #0: 00000000d9f35d0e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 851.963196][ T1041] #1: 00000000b8c728b2 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 851.973050][ T1041] 2 locks held by getty/7636: [ 851.977789][ T1041] #0: 00000000842993cc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 851.986890][ T1041] #1: 00000000a348a04e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 851.996611][ T1041] 2 locks held by getty/7637: [ 852.001285][ T1041] #0: 000000005b2d7eb8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 852.010305][ T1041] #1: 00000000e24a1647 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 852.020081][ T1041] 2 locks held by getty/7638: [ 852.024899][ T1041] #0: 0000000040ce9c71 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 852.034087][ T1041] #1: 000000002fd98969 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 852.043723][ T1041] 2 locks held by getty/7639: [ 852.049354][ T1041] #0: 00000000332e644a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 852.058492][ T1041] #1: 000000009e75a43f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 852.068117][ T1041] [ 852.070438][ T1041] ============================================= [ 852.070438][ T1041] [ 852.079008][ T1041] NMI backtrace for cpu 0 [ 852.083411][ T1041] CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.0.0-rc5-next-20190208 #31 [ 852.092071][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.102182][ T1041] Call Trace: [ 852.105465][ T1041] dump_stack+0x172/0x1f0 [ 852.109778][ T1041] nmi_cpu_backtrace.cold+0x63/0xa4 [ 852.114979][ T1041] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 852.120590][ T1041] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 852.126645][ T1041] arch_trigger_cpumask_backtrace+0x14/0x20 [ 852.132524][ T1041] watchdog+0x9df/0xee0 [ 852.136721][ T1041] kthread+0x357/0x430 [ 852.140904][ T1041] ? reset_hung_task_detector+0x30/0x30 [ 852.146433][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 852.152661][ T1041] ret_from_fork+0x3a/0x50 [ 852.157194][ T1041] Sending NMI from CPU 0 to CPUs 1: [ 852.162641][ C1] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 852.163592][ T1041] Kernel panic - not syncing: hung_task: blocked tasks [ 852.177854][ T1041] CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.0.0-rc5-next-20190208 #31 [ 852.186646][ T1041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.196836][ T1041] Call Trace: [ 852.200188][ T1041] dump_stack+0x172/0x1f0 [ 852.204512][ T1041] panic+0x2cb/0x65c [ 852.208391][ T1041] ? __warn_printk+0xf3/0xf3 [ 852.213171][ T1041] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 852.218876][ T1041] ? printk_safe_flush+0xf2/0x140 [ 852.223892][ T1041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 852.230116][ T1041] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 852.235729][ T1041] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 852.242069][ T1041] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 852.248211][ T1041] watchdog+0x9f0/0xee0 [ 852.252357][ T1041] kthread+0x357/0x430 [ 852.256533][ T1041] ? reset_hung_task_detector+0x30/0x30 [ 852.262063][ T1041] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 852.268291][ T1041] ret_from_fork+0x3a/0x50 [ 852.273951][ T1041] Kernel Offset: disabled [ 852.278285][ T1041] Rebooting in 86400 seconds..