.299427][ T2540] loop4: p3 start 225 is beyond EOD, truncated 19:59:53 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x0, @remote}, 0x18, {0x2, 0x0, @empty}, 'syz_tun\x00'}) 19:59:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x30}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 19:59:53 executing program 0: r0 = socket(0x1d, 0x2, 0x6) getpeername$qrtr(r0, 0x0, 0x0) 19:59:53 executing program 5: r0 = socket(0x1d, 0x2, 0x6) getpeername$qrtr(r0, 0x0, 0x0) 19:59:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x6}, 0x8) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x83, &(0x7f0000000040)={r2, @in6={{0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000100)=0x84) [ 33.305684][ T2540] loop4: p4 size 3657465856 extends beyond EOD, truncated 19:59:53 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffff82000800000000000000024000ffffff82000000e10000008877007200300700a9ffffff00000000008000da55aa", 0x40, 0x1c0}]) 19:59:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x6}, 0x8) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x83, &(0x7f0000000040)={r2, @in6={{0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000100)=0x84) 19:59:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x30}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 19:59:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x6}, 0x8) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x83, &(0x7f0000000040)={r2, @in6={{0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000100)=0x84) 19:59:53 executing program 0: r0 = socket(0x1d, 0x2, 0x6) getpeername$qrtr(r0, 0x0, 0x0) [ 33.348008][ T24] kauditd_printk_skb: 19 callbacks suppressed [ 33.354205][ T24] audit: type=1400 audit(1639339193.876:119): avc: denied { create } for pid=2563 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 33.374230][ T24] audit: type=1400 audit(1639339193.886:120): avc: denied { getopt } for pid=2563 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 19:59:53 executing program 5: r0 = socket(0x1d, 0x2, 0x6) getpeername$qrtr(r0, 0x0, 0x0) 19:59:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x6}, 0x8) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x83, &(0x7f0000000040)={r2, @in6={{0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000100)=0x84) 19:59:53 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0xfffffff8, 0x4) 19:59:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x6}, 0x8) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x83, &(0x7f0000000040)={r2, @in6={{0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000100)=0x84) 19:59:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f201000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000001ff", 0x5e, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 33.411312][ T2574] loop4: detected capacity change from 0 to 1 19:59:54 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0xfffffff8, 0x4) 19:59:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x6}, 0x8) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x83, &(0x7f0000000040)={r2, @in6={{0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000100)=0x84) [ 33.460263][ T2070] loop4: p1 p2 p3 p4 [ 33.464365][ T2070] loop4: p1 start 10 is beyond EOD, truncated [ 33.470570][ T2070] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 33.484778][ T2070] loop4: p3 start 225 is beyond EOD, truncated [ 33.491030][ T2070] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 33.493577][ T2587] loop5: detected capacity change from 0 to 512 [ 33.527887][ T2574] loop4: p1 p2 p3 p4 [ 33.537611][ T2574] loop4: p1 start 10 is beyond EOD, truncated [ 33.543769][ T2574] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 33.556956][ T2574] loop4: p3 start 225 is beyond EOD, truncated [ 33.557379][ T2587] EXT4-fs error (device loop5): ext4_init_orphan_info:586: comm syz-executor.5: inode #0: comm syz-executor.5: iget: illegal inode # 19:59:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffff82000800000000000000024000ffffff82000000e10000008877007200300700a9ffffff00000000008000da55aa", 0x40, 0x1c0}]) 19:59:54 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0xfffffff8, 0x4) 19:59:54 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:54 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0xfffffff8, 0x4) 19:59:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x6}, 0x8) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x83, &(0x7f0000000040)={r2, @in6={{0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000100)=0x84) [ 33.563267][ T2574] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 33.586145][ T2587] EXT4-fs (loop5): get orphan inode failed [ 33.592354][ T2587] EXT4-fs (loop5): mount failed [ 33.643603][ T24] audit: type=1400 audit(1639339194.176:121): avc: denied { mount } for pid=2596 comm="syz-executor.3" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.666228][ T24] audit: type=1400 audit(1639339194.176:122): avc: denied { watch watch_reads } for pid=2596 comm="syz-executor.3" path="/root/syzkaller-testdir596073453/syzkaller.9jZxi4/41/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 19:59:54 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0xfffffff8, 0x4) 19:59:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbd}]}) pipe(&(0x7f0000000300)) 19:59:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f201000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000001ff", 0x5e, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 19:59:54 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0xfffffff8, 0x4) [ 33.749527][ T2080] udevd[2080]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 33.764788][ T2070] udevd[2070]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory 19:59:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x40}}, 0x0) 19:59:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbd}]}) pipe(&(0x7f0000000300)) 19:59:54 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000040)=0xfffffff8, 0x4) [ 33.818565][ T2611] loop5: detected capacity change from 0 to 512 [ 33.838600][ T2609] loop4: detected capacity change from 0 to 1 [ 33.875741][ T2611] EXT4-fs error (device loop5): ext4_init_orphan_info:586: comm syz-executor.5: inode #0: comm syz-executor.5: iget: illegal inode # [ 33.900784][ T2611] EXT4-fs (loop5): get orphan inode failed [ 33.910385][ T2611] EXT4-fs (loop5): mount failed [ 33.921971][ T2609] loop4: p1 p2 p3 p4 19:59:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffff82000800000000000000024000ffffff82000000e10000008877007200300700a9ffffff00000000008000da55aa", 0x40, 0x1c0}]) 19:59:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbd}]}) pipe(&(0x7f0000000300)) 19:59:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x40}}, 0x0) 19:59:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbd}]}) pipe(&(0x7f0000000300)) 19:59:54 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x40}}, 0x0) [ 33.926337][ T2609] loop4: p1 start 10 is beyond EOD, truncated [ 33.932473][ T2609] loop4: p2 size 1073872896 extends beyond EOD, truncated [ 33.940273][ T2609] loop4: p3 start 225 is beyond EOD, truncated [ 33.946464][ T2609] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 33.948988][ T24] audit: type=1400 audit(1639339194.486:123): avc: denied { unmount } for pid=1814 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 19:59:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbd}]}) pipe(&(0x7f0000000300)) 19:59:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f201000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000001ff", 0x5e, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 19:59:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbd}]}) pipe(&(0x7f0000000300)) 19:59:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000000)=[{}, {0x35}, {0x6, 0x0, 0x0, 0x7ffffdbd}]}) pipe(&(0x7f0000000300)) 19:59:54 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) [ 34.014637][ T2631] loop4: detected capacity change from 0 to 1 [ 34.052515][ T2638] loop5: detected capacity change from 0 to 512 19:59:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_TOS={0x5}, @IFLA_IPTUN_PMTUDISC={0x5}]}}}]}, 0x40}}, 0x0) [ 34.302108][ T2631] loop4: p1 p2 p3 p4 [ 34.306580][ T2638] EXT4-fs error (device loop5): ext4_init_orphan_info:586: comm syz-executor.5: inode #0: comm syz-executor.5: iget: illegal inode # [ 34.328275][ T2631] loop4: p1 start 10 is beyond EOD, truncated [ 34.334387][ T2631] loop4: p2 size 1073872896 extends beyond EOD, truncated 19:59:54 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:54 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:54 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:54 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) [ 34.348163][ T2638] EXT4-fs (loop5): get orphan inode failed [ 34.367014][ T2638] EXT4-fs (loop5): mount failed [ 34.372493][ T2631] loop4: p3 start 225 is beyond EOD, truncated [ 34.378707][ T2631] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 34.437798][ T2082] udevd[2082]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 34.452214][ T2070] udevd[2070]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory 19:59:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f201000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000001ff", 0x5e, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 19:59:55 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) [ 34.892501][ T2070] udevd[2070]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 34.903530][ T2080] udevd[2080]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 34.917281][ T2658] loop5: detected capacity change from 0 to 512 19:59:55 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:55 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) [ 35.268932][ T2658] EXT4-fs error (device loop5): ext4_init_orphan_info:586: comm syz-executor.5: inode #0: comm syz-executor.5: iget: illegal inode # [ 35.298556][ T2080] udevd[2080]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 35.314006][ T2070] udevd[2070]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 35.338095][ T2658] EXT4-fs (loop5): get orphan inode failed [ 35.348396][ T2658] EXT4-fs (loop5): mount failed 19:59:55 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:56 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:57 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newtaction={0x98, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x4, r3}}]}, {0x4}, {0xc}, {0xc}}}, @m_csum={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4, 0xa}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) 19:59:57 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newtaction={0x98, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x4, r3}}]}, {0x4}, {0xc}, {0xc}}}, @m_csum={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4, 0xa}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) 19:59:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1d, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="58000000140019232ee4ea50a4c8895910ff3d425f9c0510b50000000000cdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c608000000000000feff2c707fac5ed7", 0x58}], 0x1) 19:59:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newtaction={0x98, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x4, r3}}]}, {0x4}, {0xc}, {0xc}}}, @m_csum={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4, 0xa}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) [ 37.014063][ T24] audit: type=1400 audit(1639339197.546:124): avc: denied { create } for pid=2700 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 37.055759][ T24] audit: type=1400 audit(1639339197.576:125): avc: denied { setopt } for pid=2700 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 19:59:57 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newtaction={0x98, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{}, 0x4, r3}}]}, {0x4}, {0xc}, {0xc}}}, @m_csum={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x4, 0xa}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) 19:59:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1d, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="58000000140019232ee4ea50a4c8895910ff3d425f9c0510b50000000000cdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c608000000000000feff2c707fac5ed7", 0x58}], 0x1) [ 37.268083][ T24] audit: type=1400 audit(1639339197.756:126): avc: denied { write } for pid=2700 comm="syz-executor.4" path="socket:[19722]" dev="sockfs" ino=19722 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 37.292787][ T24] audit: type=1400 audit(1639339197.756:127): avc: denied { nlmsg_read } for pid=2700 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 19:59:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1d, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="58000000140019232ee4ea50a4c8895910ff3d425f9c0510b50000000000cdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c608000000000000feff2c707fac5ed7", 0x58}], 0x1) 19:59:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1d, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="58000000140019232ee4ea50a4c8895910ff3d425f9c0510b50000000000cdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c608000000000000feff2c707fac5ed7", 0x58}], 0x1) 19:59:58 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1d, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="58000000140019232ee4ea50a4c8895910ff3d425f9c0510b50000000000cdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c608000000000000feff2c707fac5ed7", 0x58}], 0x1) 19:59:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1d, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="58000000140019232ee4ea50a4c8895910ff3d425f9c0510b50000000000cdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c608000000000000feff2c707fac5ed7", 0x58}], 0x1) 19:59:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x22, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 19:59:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x22, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 19:59:58 executing program 1: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 19:59:58 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x1d, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="58000000140019232ee4ea50a4c8895910ff3d425f9c0510b50000000000cdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c608000000000000feff2c707fac5ed7", 0x58}], 0x1) 19:59:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x22, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 19:59:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x22, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 19:59:58 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) 19:59:58 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa0000809) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0x200000000008d}, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)=ANY=[], 0xffffffe3) unlink(&(0x7f00000000c0)='./bus\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) 19:59:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:58 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) [ 38.090050][ C0] sd 0:0:1:0: tag#3356 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.099907][ C0] sd 0:0:1:0: tag#3356 CDB: opcode=0xe5 (vendor) [ 38.106243][ C0] sd 0:0:1:0: tag#3356 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.115301][ C0] sd 0:0:1:0: tag#3356 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.124348][ C0] sd 0:0:1:0: tag#3356 CDB[20]: ba 19:59:58 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) 19:59:58 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) [ 38.159987][ T24] audit: type=1400 audit(1639339198.676:128): avc: denied { cpu } for pid=2755 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 19:59:58 executing program 1: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 19:59:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) [ 38.452951][ C1] sd 0:0:1:0: tag#3357 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.462910][ C1] sd 0:0:1:0: tag#3357 CDB: opcode=0xe5 (vendor) [ 38.463010][ C0] sd 0:0:1:0: tag#3359 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.469253][ C1] sd 0:0:1:0: tag#3357 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.479046][ C0] sd 0:0:1:0: tag#3359 CDB: opcode=0xe5 (vendor) [ 38.488163][ C1] sd 0:0:1:0: tag#3357 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.494538][ C0] sd 0:0:1:0: tag#3359 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.503740][ C1] sd 0:0:1:0: tag#3357 CDB[20]: ba [ 38.503792][ C1] sd 0:0:1:0: tag#3358 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.512796][ C0] sd 0:0:1:0: tag#3359 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.517882][ C1] sd 0:0:1:0: tag#3358 CDB: opcode=0xe5 (vendor) [ 38.517914][ C1] sd 0:0:1:0: tag#3358 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.527685][ C0] sd 0:0:1:0: tag#3359 CDB[20]: ba [ 38.536694][ C1] sd 0:0:1:0: tag#3358 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.554382][ C0] sd 0:0:1:0: tag#3360 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.557147][ C1] sd 0:0:1:0: tag#3358 CDB[20]: ba [ 38.559588][ C1] sd 0:0:1:0: tag#3361 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.566214][ C0] sd 0:0:1:0: tag#3360 CDB: opcode=0xe5 (vendor) [ 38.575988][ C1] sd 0:0:1:0: tag#3361 CDB: opcode=0xe5 (vendor) 19:59:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) [ 38.581084][ C0] sd 0:0:1:0: tag#3360 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.590885][ C1] sd 0:0:1:0: tag#3361 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.597297][ C0] sd 0:0:1:0: tag#3360 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.603623][ C1] sd 0:0:1:0: tag#3361 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.612667][ C0] sd 0:0:1:0: tag#3360 CDB[20]: ba [ 38.621705][ C1] sd 0:0:1:0: tag#3361 CDB[20]: ba 19:59:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) [ 38.682695][ C0] sd 0:0:1:0: tag#3362 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.692738][ C0] sd 0:0:1:0: tag#3362 CDB: opcode=0xe5 (vendor) [ 38.699168][ C0] sd 0:0:1:0: tag#3362 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.708342][ C0] sd 0:0:1:0: tag#3362 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.714820][ C1] sd 0:0:1:0: tag#3363 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.717365][ C0] sd 0:0:1:0: tag#3362 CDB[20]: ba [ 38.727166][ C1] sd 0:0:1:0: tag#3363 CDB: opcode=0xe5 (vendor) [ 38.738730][ C1] sd 0:0:1:0: tag#3363 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.747861][ C1] sd 0:0:1:0: tag#3363 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.757026][ C1] sd 0:0:1:0: tag#3363 CDB[20]: ba 19:59:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) [ 38.779448][ C0] sd 0:0:1:0: tag#3365 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.789309][ C0] sd 0:0:1:0: tag#3365 CDB: opcode=0xe5 (vendor) [ 38.795657][ C0] sd 0:0:1:0: tag#3365 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.804709][ C0] sd 0:0:1:0: tag#3365 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.813774][ C0] sd 0:0:1:0: tag#3365 CDB[20]: ba [ 38.833259][ C0] sd 0:0:1:0: tag#3367 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 38.843215][ C0] sd 0:0:1:0: tag#3367 CDB: opcode=0xe5 (vendor) [ 38.849579][ C0] sd 0:0:1:0: tag#3367 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 38.858797][ C0] sd 0:0:1:0: tag#3367 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 38.867828][ C0] sd 0:0:1:0: tag#3367 CDB[20]: ba 19:59:59 executing program 1: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 19:59:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 19:59:59 executing program 3: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 19:59:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 19:59:59 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) 19:59:59 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) 19:59:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 20:00:00 executing program 1: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 20:00:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) 20:00:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 20:00:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 20:00:00 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 20:00:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc150d4e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000440)={{r2}, 0x0, 0x0, @inherit={0x0, 0x0}, @devid}) 20:00:00 executing program 3: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 20:00:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) 20:00:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) 20:00:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x1}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 20:00:00 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) clone(0x2000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000240)='[[#\x00', &(0x7f0000000480)='}\x00']) 20:00:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:01 executing program 0: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x1}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 20:00:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:01 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 20:00:01 executing program 0: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:01 executing program 3: r0 = syz_io_uring_setup(0x87, &(0x7f0000000140), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ee5000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000004280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6cb3, 0x0, 0x0, 0x0, 0x0) connect$unix(r3, &(0x7f00000002c0)=@abs, 0x6e) 20:00:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x1}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 20:00:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:01 executing program 0: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x1}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 20:00:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:01 executing program 0: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:01 executing program 4: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x1}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 20:00:02 executing program 0: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x1}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 20:00:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:02 executing program 4: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3c}, @NFTA_SET_EXPR={0x24, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x60}]}}}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 20:00:02 executing program 0: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:02 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8}, {0x0, 0x7fff}], 0x2, 0x0) 20:00:02 executing program 4: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:02 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8}, {0x0, 0x7fff}], 0x2, 0x0) 20:00:02 executing program 0: r0 = epoll_create(0x9) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10000015}) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0x0) 20:00:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000040)=[{0x35, 0x0, 0x0, 0x1}, {0x5c}, {0x6, 0x0, 0x0, 0x7fff8002}]}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 20:00:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3c}, @NFTA_SET_EXPR={0x24, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x60}]}}}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 20:00:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:02 executing program 0: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 20:00:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x2, 0x2, 0x401}, 0x14}}, 0x0) 20:00:02 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8}, {0x0, 0x7fff}], 0x2, 0x0) 20:00:02 executing program 1: lstat(0x0, 0x0) 20:00:02 executing program 1: lstat(0x0, 0x0) 20:00:02 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x8}, {0x0, 0x7fff}], 0x2, 0x0) 20:00:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3c}, @NFTA_SET_EXPR={0x24, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x60}]}}}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 20:00:02 executing program 1: lstat(0x0, 0x0) 20:00:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x2, 0x2, 0x401}, 0x14}}, 0x0) 20:00:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:00:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b7000000ff000000bfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff000000002d040000000000001d400500000000004704000001ed000062030000000000001d440000000000007a0a00fe00ffffffc303000050000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c7bc46dd12305a1ae9dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ad1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 20:00:02 executing program 1: lstat(0x0, 0x0) 20:00:03 executing program 0: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 20:00:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3c}, @NFTA_SET_EXPR={0x24, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x60}]}}}]}], {0x14, 0x10}}, 0xa8}}, 0x0) 20:00:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x2, 0x2, 0x401}, 0x14}}, 0x0) 20:00:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x5, 0x3500, 0x1e6, 0x0, 0xffffffffffffffff, 0x4001}, 0x40) 20:00:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 20:00:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 20:00:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x2, 0x2, 0x401}, 0x14}}, 0x0) 20:00:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) [ 42.573519][ T24] audit: type=1400 audit(1639339203.106:129): avc: denied { map_create } for pid=2954 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 20:00:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 20:00:03 executing program 4: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 20:00:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 20:00:03 executing program 2: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) [ 42.690670][ T24] audit: type=1400 audit(1639339203.226:130): avc: denied { map_read map_write } for pid=2954 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 20:00:03 executing program 0: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 20:00:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 20:00:03 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x5, 0x3500, 0x1e6, 0x0, 0xffffffffffffffff, 0x4001}, 0x40) 20:00:03 executing program 5: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:03 executing program 4: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 20:00:03 executing program 2: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) [ 43.291295][ T24] audit: type=1400 audit(1639339203.826:131): avc: denied { read } for pid=2988 comm="syz-executor.5" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 43.348462][ T24] audit: type=1400 audit(1639339203.846:132): avc: denied { open } for pid=2988 comm="syz-executor.5" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 43.373448][ T24] audit: type=1400 audit(1639339203.856:133): avc: denied { ioctl } for pid=2988 comm="syz-executor.5" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 20:00:03 executing program 5: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x5, 0x3500, 0x1e6, 0x0, 0xffffffffffffffff, 0x4001}, 0x40) 20:00:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x5, 0x3500, 0x1e6, 0x0, 0xffffffffffffffff, 0x4001}, 0x40) 20:00:04 executing program 5: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 1: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 0: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 20:00:04 executing program 5: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:04 executing program 1: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 2: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) poll(0x0, 0x0, 0x1ff) 20:00:04 executing program 4: unshare(0x40400) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0xaaaaaaaaaaaab18, &(0x7f0000000180), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="3030303030303030303030303030302729f9918a1c1e453030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c00060881e7e6820657f37c74cd118d1b65929de3040ebaaf5be08c39929a730ae2110599145105000000d8fa52ce14fc2615006da682810f0c2037877884a66055193237400fca927485897fd6aa3aeac39766c39842288efe2a73a2c997674466280317abeb6c34b9e173c0d96863cc6918ef1c765fc08612d623030957a5635b5e79fcb5014e16763736937835e03bd8f3a4a839f354382f989eaf9d2528d9f4005a0cf9347da40169d72e0c2bc46aaf5ee7f12f0baaeb6f73e9f858ae6eac0ff29275965a5871cc8120535e0000bf63068cc8054cb75c0c47a93b5dd33afb87f757a38a5b75195709ca5739d72f65262948cbb202c81dd9d1eae31df5a3e784b74f9e6b95ca6720cc76ca640f5ddc3eb6272e0274a7b1ab81a021cfc92a140aa0a33268d1e2b4a04c9ac23003e1da0b5ced4065810fbd6a862cb40c00000000dc85640ce7d722c45e93c939eb55000000000000000000000040000000342748b3aa0381b379147659b5d98aac1c9cbdbeb10aae14c06f9ec6f8213b48ffffffff00000000009660b4383a87d8424c9daf899467a544aafafaaa6ac9c21b81014be7eaf5a2f6e0acb4b0fa459a2c13f4bfa293738b6d27f851b21898ec8b0e8acabb3309328a9ea714d66fcf461ef12af4abe91e4c4139909265e15587fca777d663de0c61dc72195bde12b1ddb5ad22de8a6d736f10361fafb20f915cb437a5843812b29138e02a81cbe9a1e7efad9b20ccb1ab1785661b87f59205afecc47022b53ce8f48179517123c269364427d53ff5617eb0f68e521d6a84264077a987c9c4a57613cd27464ebb962f9c9967da2deb310cc0b8e8e0d902a3c05e1c3d985699eb06fe0c07e1e5f74aa63e30ea5924c012cfd53c15727d28ff3db5d82dbe0c2175f59b146873"]) poll(0x0, 0x0, 0x1ff) 20:00:04 executing program 5: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 1: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 5: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 5: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:04 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:04 executing program 0: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:04 executing program 5: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:05 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:05 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:05 executing program 0: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:05 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:05 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:06 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:06 executing program 5: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:06 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:06 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:06 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:06 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:06 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:06 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:06 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:06 executing program 0: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:06 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:06 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:07 executing program 5: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xd123}], 0x1, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x8000}], 0x1) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 20:00:07 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:07 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x2, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x6}]}, 0x48}}, 0x0) 20:00:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x2, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x6}]}, 0x48}}, 0x0) 20:00:07 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x2, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x6}]}, 0x48}}, 0x0) 20:00:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x2, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x6}]}, 0x48}}, 0x0) 20:00:07 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:07 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:07 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x16, 0x0, &(0x7f00000000c0)) [ 46.997958][ T24] audit: type=1400 audit(1639339207.526:134): avc: denied { create } for pid=3129 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 47.017943][ T24] audit: type=1400 audit(1639339207.526:135): avc: denied { listen } for pid=3129 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 20:00:08 executing program 2: shmget(0x2, 0x2000, 0x0, &(0x7f00003d4000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000c40)=""/4096) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f00000035c0)={{}, 0x0, 0x4, @unused=[0x0, 0xfffc, 0xfffffffffffeffff], @devid}) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x44, 0x91, 0x81, 0x76, 0x0, 0x5, 0x40000, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x4, @perf_config_ext={0xfffffffffffff8dd, 0x1ff}, 0x8001, 0x4, 0x7, 0x8, 0x9, 0xd, 0xffec, 0x0, 0x400, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x80, 0x3f, 0x11, 0x0, 0x3d, 0x0, 0x6, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20, 0x101, 0xdafb, 0x2, 0x74dc, 0x5, 0xfffa, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x400000000000000c, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3, 0x7, 0x5, 0xbd, 0x0, 0x2, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x1, 0x0, 0x5, 0x20, 0x200, 0x4, 0x0, 0x15, 0x0, 0x7f}, 0xffffffffffffffff, 0xd, r1, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x2, 0xd9, 0x20, 0x3a, 0x0, 0x4, 0x2c007, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x200, 0xf3}, 0x2408, 0xf6, 0x2, 0x2, 0x3ff, 0x43, 0xe0, 0x0, 0x41b12f53, 0x0, 0x10000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0xc8, 0x40, 0x4, 0x0, 0x5, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x300, 0x8000, 0x94f, 0x4, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x18) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) 20:00:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x2, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x6}]}, 0x48}}, 0x0) 20:00:08 executing program 1: bpf$BPF_LINK_CREATE(0x2, 0x0, 0x10) 20:00:08 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x16, 0x0, &(0x7f00000000c0)) 20:00:08 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x16, 0x0, &(0x7f00000000c0)) 20:00:08 executing program 1: bpf$BPF_LINK_CREATE(0x2, 0x0, 0x10) 20:00:08 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x2, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x6}]}, 0x48}}, 0x0) 20:00:08 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x16, 0x0, &(0x7f00000000c0)) 20:00:08 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 1: bpf$BPF_LINK_CREATE(0x2, 0x0, 0x10) 20:00:08 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x2, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x6}]}, 0x48}}, 0x0) 20:00:08 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100766574680000", @ANYRES32=r1], 0x3c}}, 0x0) 20:00:08 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x7) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:00:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x4, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x30}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 20:00:08 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 1: bpf$BPF_LINK_CREATE(0x2, 0x0, 0x10) 20:00:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)={[{@noinit_itable}, {@noacl}, {@noauto_da_alloc}, {@debug}, {@inode_readahead_blks}, {@block_validity}, {@test_dummy_encryption}, {@dioread_nolock}, {}, {@nogrpid}], [{@seclabel}, {@measure}, {@hash}, {@appraise_type}, {@dont_measure}, {@smackfshat}, {@context={'context', 0x3d, 'root'}}]}) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4) 20:00:08 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = epoll_create1(0x0) listen(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:00:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x4, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x30}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 20:00:08 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e70500b097eaa769beada391dc82530dc4a9bcee7b5b3f938d3b74dab2fbb11a98433229872ea48c0d16aa412334428c0d8786c8299aae6bd49b13980191ec8e40eb8b26ebaf522330da39fa72892425c1c89a8d66045a73819e33e61e3b8971d58539ef76d7119c6953bd991603edd6f4e41d28289cdab37091e3e0a934290a5e40bc727423fc621cf11cdd0ff434b02036d34599a2813697fead591daf70463e62c7aa87f4dc9d51838cb9a0ad4532e87f7c306c1cccb18184532ec7c031308a91526fa0ebec7ab86a012aeca17469bc7bd3e00b8cede60e567a92e91feb9d013a6156dc9208c339aa3028c34dd13a5599c252e634fb7fab1f9724df8516736aead0e4991ad9d03ff73975b33f86b1de16a0ba1598a190613f", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x7) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 47.684406][ T3167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 47.693797][ T3167] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x7) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:00:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x7) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:00:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)={[{@noinit_itable}, {@noacl}, {@noauto_da_alloc}, {@debug}, {@inode_readahead_blks}, {@block_validity}, {@test_dummy_encryption}, {@dioread_nolock}, {}, {@nogrpid}], [{@seclabel}, {@measure}, {@hash}, {@appraise_type}, {@dont_measure}, {@smackfshat}, {@context={'context', 0x3d, 'root'}}]}) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4) 20:00:08 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x7) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:00:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x4, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x30}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 20:00:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x7) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:00:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100766574680000", @ANYRES32=r1], 0x3c}}, 0x0) 20:00:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)={[{@noinit_itable}, {@noacl}, {@noauto_da_alloc}, {@debug}, {@inode_readahead_blks}, {@block_validity}, {@test_dummy_encryption}, {@dioread_nolock}, {}, {@nogrpid}], [{@seclabel}, {@measure}, {@hash}, {@appraise_type}, {@dont_measure}, {@smackfshat}, {@context={'context', 0x3d, 'root'}}]}) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4) 20:00:08 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e70500b097eaa769beada391dc82530dc4a9bcee7b5b3f938d3b74dab2fbb11a98433229872ea48c0d16aa412334428c0d8786c8299aae6bd49b13980191ec8e40eb8b26ebaf522330da39fa72892425c1c89a8d66045a73819e33e61e3b8971d58539ef76d7119c6953bd991603edd6f4e41d28289cdab37091e3e0a934290a5e40bc727423fc621cf11cdd0ff434b02036d34599a2813697fead591daf70463e62c7aa87f4dc9d51838cb9a0ad4532e87f7c306c1cccb18184532ec7c031308a91526fa0ebec7ab86a012aeca17469bc7bd3e00b8cede60e567a92e91feb9d013a6156dc9208c339aa3028c34dd13a5599c252e634fb7fab1f9724df8516736aead0e4991ad9d03ff73975b33f86b1de16a0ba1598a190613f", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x7) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 20:00:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x4, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x30}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 20:00:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)={[{@noinit_itable}, {@noacl}, {@noauto_da_alloc}, {@debug}, {@inode_readahead_blks}, {@block_validity}, {@test_dummy_encryption}, {@dioread_nolock}, {}, {@nogrpid}], [{@seclabel}, {@measure}, {@hash}, {@appraise_type}, {@dont_measure}, {@smackfshat}, {@context={'context', 0x3d, 'root'}}]}) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4) [ 47.832718][ T3167] syz-executor.2 (3167) used greatest stack depth: 9848 bytes left 20:00:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 1: syz_open_dev$loop(&(0x7f000000ed80), 0x0, 0x4000) 20:00:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@newae={0x50, 0x1e, 0x1, 0x0, 0x0, {{@in6=@loopback}, @in=@broadcast}, [@replay_val={0x10}]}, 0x50}}, 0x0) [ 47.887456][ T3212] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 47.896857][ T3212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:08 executing program 1: syz_open_dev$loop(&(0x7f000000ed80), 0x0, 0x4000) [ 47.963163][ T24] audit: type=1400 audit(1639339208.496:136): avc: denied { create } for pid=3228 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 47.990729][ T24] audit: type=1400 audit(1639339208.526:137): avc: denied { write } for pid=3228 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 20:00:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100766574680000", @ANYRES32=r1], 0x3c}}, 0x0) 20:00:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 1: syz_open_dev$loop(&(0x7f000000ed80), 0x0, 0x4000) 20:00:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@newae={0x50, 0x1e, 0x1, 0x0, 0x0, {{@in6=@loopback}, @in=@broadcast}, [@replay_val={0x10}]}, 0x50}}, 0x0) 20:00:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) 20:00:08 executing program 1: syz_open_dev$loop(&(0x7f000000ed80), 0x0, 0x4000) [ 48.011226][ T24] audit: type=1400 audit(1639339208.526:138): avc: denied { nlmsg_write } for pid=3228 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 48.047780][ T3212] syz-executor.2 (3212) used greatest stack depth: 9720 bytes left 20:00:08 executing program 0: r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000190000/0x2000)=nil, &(0x7f0000000400)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000015c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x1) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) 20:00:08 executing program 0: r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000190000/0x2000)=nil, &(0x7f0000000400)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000015c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x1) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) 20:00:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@newae={0x50, 0x1e, 0x1, 0x0, 0x0, {{@in6=@loopback}, @in=@broadcast}, [@replay_val={0x10}]}, 0x50}}, 0x0) 20:00:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x400) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, &(0x7f0000000200)={0x1f}, 0x0) [ 48.104587][ T3244] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 48.113938][ T3244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100766574680000", @ANYRES32=r1], 0x3c}}, 0x0) 20:00:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$packet_add_memb(r0, 0x29, 0x21, 0x0, 0x0) 20:00:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@newae={0x50, 0x1e, 0x1, 0x0, 0x0, {{@in6=@loopback}, @in=@broadcast}, [@replay_val={0x10}]}, 0x50}}, 0x0) 20:00:08 executing program 3: sync() openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:00:08 executing program 0: r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000190000/0x2000)=nil, &(0x7f0000000400)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000015c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x1) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) 20:00:08 executing program 0: r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f0000190000/0x2000)=nil, &(0x7f0000000400)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f00000015c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, 0x0}, 0x1) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) [ 48.204069][ T24] audit: type=1400 audit(1639339208.736:139): avc: denied { setopt } for pid=3256 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 48.235940][ T3267] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$packet_add_memb(r0, 0x29, 0x21, 0x0, 0x0) 20:00:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0xd, 0x2, &(0x7f0000000740)=@raw=[@call={0x85, 0x0, 0x0, 0x39}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:00:08 executing program 3: sync() openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:00:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$packet_add_memb(r0, 0x29, 0x21, 0x0, 0x0) 20:00:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0xd, 0x2, &(0x7f0000000740)=@raw=[@call={0x85, 0x0, 0x0, 0x39}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 48.245397][ T3267] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$packet_add_memb(r0, 0x29, 0x21, 0x0, 0x0) 20:00:08 executing program 0: prctl$PR_SET_NAME(0x25, &(0x7f0000000040)='\x1e\x89?\xf5\x9a\\v\xb8\x93\xd03\xf5y\xc1l\xa8\x01') 20:00:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:09 executing program 3: sync() openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:00:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0xd, 0x2, &(0x7f0000000740)=@raw=[@call={0x85, 0x0, 0x0, 0x39}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:00:09 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendto$isdn(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x6) 20:00:09 executing program 0: prctl$PR_SET_NAME(0x25, &(0x7f0000000040)='\x1e\x89?\xf5\x9a\\v\xb8\x93\xd03\xf5y\xc1l\xa8\x01') 20:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x8a}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x23) 20:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x8a}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x23) 20:00:09 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendto$isdn(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x6) 20:00:09 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0xd, 0x2, &(0x7f0000000740)=@raw=[@call={0x85, 0x0, 0x0, 0x39}, @exit], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:00:09 executing program 0: prctl$PR_SET_NAME(0x25, &(0x7f0000000040)='\x1e\x89?\xf5\x9a\\v\xb8\x93\xd03\xf5y\xc1l\xa8\x01') [ 48.533397][ T24] audit: type=1400 audit(1639339209.066:140): avc: denied { write } for pid=3288 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 20:00:09 executing program 3: sync() openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:00:09 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendto$isdn(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x6) 20:00:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:09 executing program 0: prctl$PR_SET_NAME(0x25, &(0x7f0000000040)='\x1e\x89?\xf5\x9a\\v\xb8\x93\xd03\xf5y\xc1l\xa8\x01') 20:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x8a}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x23) 20:00:09 executing program 5: r0 = socket(0x1d, 0x3, 0x1) sendto$isdn(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x6) 20:00:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:09 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendto$isdn(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x6) 20:00:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xa, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x8a}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x23) 20:00:09 executing program 5: r0 = socket(0x1d, 0x3, 0x1) sendto$isdn(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x6) 20:00:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:09 executing program 1: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:09 executing program 5: r0 = socket(0x1d, 0x3, 0x1) sendto$isdn(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x6) [ 48.922046][ T24] audit: type=1400 audit(1639339209.456:141): avc: denied { name_bind } for pid=3330 comm="syz-executor.0" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 48.944175][ T24] audit: type=1400 audit(1639339209.456:142): avc: denied { node_bind } for pid=3330 comm="syz-executor.0" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 20:00:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:09 executing program 5: syz_emit_ethernet(0x130, &(0x7f00000069c0)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x122, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x6}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x14, 0xf989, "f8d1940d8525f97c89cc59e4d0723b8f"}, @mss={0x2, 0x4}, @sack={0x5, 0x6, [0x0]}, @exp_fastopen={0xfe, 0xb, 0xf989, "3acfa7d06999c3"}, @mptcp=@mp_fclose={0x1e, 0xc}, @mptcp=@capable={0x1e, 0xc}]}}, {"fb83d8fcea48d7308a2b650cfb48a77a3725865589103067504f74424cf4a905a905fe12d18248cdc12be42c25f185af755723756e8c0f66aafde654c720574001a4f92114d5d27c3507eb7e70536f00d83434ba9b66957e6d524715cea14cf25ac76feb5bf3596b343666acb6d948ca2ddf2b241554e6f473cac07d5ea332874bece6514276457057f3522e9d093d1e643b40a873f7ddbad4b9dc05926089a85893c8368f91d04c9d828a53447c"}}}}}}, 0x0) 20:00:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:09 executing program 1: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:10 executing program 5: syz_emit_ethernet(0x130, &(0x7f00000069c0)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x122, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x6}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x14, 0xf989, "f8d1940d8525f97c89cc59e4d0723b8f"}, @mss={0x2, 0x4}, @sack={0x5, 0x6, [0x0]}, @exp_fastopen={0xfe, 0xb, 0xf989, "3acfa7d06999c3"}, @mptcp=@mp_fclose={0x1e, 0xc}, @mptcp=@capable={0x1e, 0xc}]}}, {"fb83d8fcea48d7308a2b650cfb48a77a3725865589103067504f74424cf4a905a905fe12d18248cdc12be42c25f185af755723756e8c0f66aafde654c720574001a4f92114d5d27c3507eb7e70536f00d83434ba9b66957e6d524715cea14cf25ac76feb5bf3596b343666acb6d948ca2ddf2b241554e6f473cac07d5ea332874bece6514276457057f3522e9d093d1e643b40a873f7ddbad4b9dc05926089a85893c8368f91d04c9d828a53447c"}}}}}}, 0x0) 20:00:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 5: syz_emit_ethernet(0x130, &(0x7f00000069c0)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x122, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x6}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x14, 0xf989, "f8d1940d8525f97c89cc59e4d0723b8f"}, @mss={0x2, 0x4}, @sack={0x5, 0x6, [0x0]}, @exp_fastopen={0xfe, 0xb, 0xf989, "3acfa7d06999c3"}, @mptcp=@mp_fclose={0x1e, 0xc}, @mptcp=@capable={0x1e, 0xc}]}}, {"fb83d8fcea48d7308a2b650cfb48a77a3725865589103067504f74424cf4a905a905fe12d18248cdc12be42c25f185af755723756e8c0f66aafde654c720574001a4f92114d5d27c3507eb7e70536f00d83434ba9b66957e6d524715cea14cf25ac76feb5bf3596b343666acb6d948ca2ddf2b241554e6f473cac07d5ea332874bece6514276457057f3522e9d093d1e643b40a873f7ddbad4b9dc05926089a85893c8368f91d04c9d828a53447c"}}}}}}, 0x0) 20:00:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 5: syz_emit_ethernet(0x130, &(0x7f00000069c0)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x122, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x6}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x14, 0xf989, "f8d1940d8525f97c89cc59e4d0723b8f"}, @mss={0x2, 0x4}, @sack={0x5, 0x6, [0x0]}, @exp_fastopen={0xfe, 0xb, 0xf989, "3acfa7d06999c3"}, @mptcp=@mp_fclose={0x1e, 0xc}, @mptcp=@capable={0x1e, 0xc}]}}, {"fb83d8fcea48d7308a2b650cfb48a77a3725865589103067504f74424cf4a905a905fe12d18248cdc12be42c25f185af755723756e8c0f66aafde654c720574001a4f92114d5d27c3507eb7e70536f00d83434ba9b66957e6d524715cea14cf25ac76feb5bf3596b343666acb6d948ca2ddf2b241554e6f473cac07d5ea332874bece6514276457057f3522e9d093d1e643b40a873f7ddbad4b9dc05926089a85893c8368f91d04c9d828a53447c"}}}}}}, 0x0) 20:00:10 executing program 0: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:10 executing program 5: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:10 executing program 1: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:10 executing program 0: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') mlockall(0x3) read(r0, &(0x7f0000001080)=""/4098, 0x1002) 20:00:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:11 executing program 5: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:11 executing program 1: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:11 executing program 0: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:00:11 executing program 3: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 2: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 3: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r4, @ANYBLOB="1952000000000000cc001a8018000a80140007"], 0xec}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) [ 50.815461][ T24] audit: type=1400 audit(1639339211.346:143): avc: denied { create } for pid=3404 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 20:00:11 executing program 2: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 4: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) [ 50.876998][ T24] audit: type=1400 audit(1639339211.376:144): avc: denied { getopt } for pid=3404 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 20:00:11 executing program 5: mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:00:11 executing program 4: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 3: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 2: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 0: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 3: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 1: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 4: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 2: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 0: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 3: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 1: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 3: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:11 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:11 executing program 1: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 0: unshare(0x2a040600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x0, &(0x7f0000001680)=""/71, &(0x7f00000000c0)=0x47) 20:00:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) [ 51.233832][ T24] audit: type=1400 audit(1639339211.766:145): avc: denied { ioctl } for pid=3441 comm="syz-executor.2" path="socket:[22005]" dev="sockfs" ino=22005 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 51.264154][ T3451] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) syz_emit_ethernet(0x72, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0xfffffffe, @local}, {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 20:00:11 executing program 3: r0 = memfd_create(&(0x7f0000000000)='prodM\xb0\xea\a\x06\x00\xaen/\xce4\x00\x001foCe\xd0\x04\x00\x00\x00\x8at\xa24>X@\rq@\xf2\xe9[\xc9\x10\x04\x00\x00\x00dE\x8bqa\xda>mRv_\xa6%\x1dz\xd0\x11\xe3\x05N\xa1\x84\xea#P\x04\xca\xae\xeb?;Y\xeb\x8f\xec\xb4\xf9\x17\xb7\x04\xc2\xc0\xc6Ww\xbe\x7f\xe8F\x15%\xad\t\xeeD\xb8\xf9\xa8\x06\xa7\xdc\x06\x7f\x00\xc3\x17\x96\x13[\\A\x1dO\x03~Dk\xeb\x80\f\xed\xe4\xe1[\xbd\x9d^\xffj\x9c\x14\xda\xb6v\x1d*1>\x8f\xfc\xcd\x9b3\xa2N*]\x00\x00\x00', 0x3) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 20:00:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbba86dd609b4e0000442f00fc000000000000000000000000000000ff020000000000000000000000000001242081000002"], 0x0) 20:00:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) 20:00:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) syz_emit_ethernet(0x72, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0xfffffffe, @local}, {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) [ 51.280459][ T3451] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbba86dd609b4e0000442f00fc000000000000000000000000000000ff020000000000000000000000000001242081000002"], 0x0) 20:00:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) syz_emit_ethernet(0x72, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0xfffffffe, @local}, {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) [ 51.384280][ T3467] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 51.391777][ T3467] macvlan2: mtu less than device minimum 20:00:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) 20:00:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) syz_emit_ethernet(0x72, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0xfffffffe, @local}, {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 20:00:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) syz_emit_ethernet(0x72, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0xfffffffe, @local}, {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 20:00:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbba86dd609b4e0000442f00fc000000000000000000000000000000ff020000000000000000000000000001242081000002"], 0x0) 20:00:11 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) syz_emit_ethernet(0x72, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0xfffffffe, @local}, {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 20:00:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) 20:00:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) syz_emit_ethernet(0x72, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0xfffffffe, @local}, {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 20:00:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbba86dd609b4e0000442f00fc000000000000000000000000000000ff020000000000000000000000000001242081000002"], 0x0) 20:00:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) [ 51.600835][ T3493] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 51.608432][ T3493] macvlan2: mtu less than device minimum [ 51.670018][ T3496] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 51.677441][ T3496] macvlan2: mtu less than device minimum [ 51.691537][ T3497] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 51.699058][ T3497] macvlan2: mtu less than device minimum 20:00:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:12 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:13 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) [ 52.462777][ T3513] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 52.471112][ T3513] macvlan2: mtu less than device minimum [ 52.495584][ T3515] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 52.503261][ T3515] macvlan2: mtu less than device minimum [ 52.522612][ T3514] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 52.530025][ T3514] macvlan2: mtu less than device minimum 20:00:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) [ 52.563293][ T3520] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 52.570746][ T3520] macvlan2: mtu less than device minimum [ 52.591751][ T3521] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 52.599517][ T3521] macvlan2: mtu less than device minimum 20:00:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) [ 52.760031][ T3529] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 52.767498][ T3529] macvlan2: mtu less than device minimum [ 52.781919][ T3525] bond0: (slave macvlan2): Error -98 calling set_mac_address 20:00:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) [ 52.976369][ T3533] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 53.149744][ T3537] bond0: (slave macvlan2): Error -98 calling set_mac_address 20:00:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:13 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="850000000700000025000000000000089500000000000000cf86f547728f7fd62efec9bc7cba134e7b06d8491b28add6577ed004c59d08f9b1e2f65227d090dbf4dcadf4621c26a97457f3946534d529cf85b55702a4f804005800f9d115e02475115a3ca275306ec69f21a56631306d7188b9aec032188fe6f6aa75fb6f496624df0ea8c77f2b16173aa4c24644f41a6626f3d7655440e1f0d20e2c5e984756e32bb6fabebc06fcf98097dc4e20e8f6683d4520e141051e8da5e74a0072b6d49ac9efc03f18ab0c92eb849f267e9a88a45d685136bd33b0e3f8400b33b4a1b67ad3ed6c4b161acbb872296c3b0f05b4f1490c6d0cc64454e5a0bea54af3fc6c49f1bc63ae54e0d82f1704d9ffc1545dc37736513e9d412c4a73482241335e3aeb03749826c3e648599a413b46ba3df5dad48836e55d9bc34bf630d3f43a5da5963d53f2527b9e0df2e522f46221186fe7577bc2f4648979b50fb8253a96b393bfe9d735e234d7cdea2a779201cb3e433519b436a99c7c818e0e3fa984f3c89b9ca12ae9458ef2e116f7270de1edad3392c3c622708845ea6e69f6f4a20d7e18db74093919325cc95a4db3000000bff66469201b626b55aac478d06f5e8c54eff0d6011ead14a1ec6078f5de980a3456ff1a31a3a3a2967b0e63c785b12d834da3e1d5984422b21ecc4442ccf4e7a2d478ec8a3de4c9e57ebedbbf568843d001e8ae464ce8bd9faea0dfc6fe437f568ddb8df52559c087eb4e0a4bc81b1363d99d5072795d3209e87cf316588994a5ad04dee870ea9f2437860b9140cee7efe0bfb2220f0b571638765ee1f030f973a2b57fdb64c990500f731b7332b4fba5298c0c0ecdccf4581f0a72ef26845f99f055c784f7f226fcfbf92db65797e6d9c6079f22936a2f48a5e547772ee0718a7f6a61b006a49debdb1e9afc3f9392ff7d41ffbf7ee5eb488c1de1d7abd153ce81db970b4915c6fccbd6eb11328f6d96a59a254f117933bc6340eee771f79f90a5c851c40acc125ac6acd682ac8ef6f393e5a69d034c5b6ebaffca972231f831685ea7eeb2aaa64e0004070bcbb91e545103e6a47180ad68113873ae89560e8241b8e09ffec1dfd566822d495ab4bc2c9a2f16463b80c4c55d3fcdd47ba6478f10a59dae536dce86e97aa8ab91b3314122cecaf1743583de3a7355d063882a917a09c1b3c7d0eef9515d9fcde7582d3978062581368c4073ca0caaa18fb232bb946abdd00de773ed973010b00d43fc4b5263e45f81fd6ebc632f22dad4c75207d7d701a428e7d60a726c8c8528fe6920e8fa5132fb9ef1d0d31edabf947c19480cc44b9e01be1370dcd6fc05327f545bd753ee5b021c76388ff0ac9b072486d654d11c3d2c3be4cf9a50ceb519e95a43a3903bbb2720f73b767a653759ca2ac302d423bd89ab641040ee3200000000d030b25fa0a68d5e732afae80a09801688f8e121dfacd0abb572280230b47f1dc1be0b152a6b5a2a652617026fb8ec66fd0f640168a90d0a440699a88b5d59bd96e2c5a8c67a15f27722695d548f0b900344b36433d7cb88878946500731f8df6ccf9ec2ed12e5e278228f75fcca5381919aef126834c2b53e17635321738f44ece50dc61fb3fd387c39df2caf57ec4efbca44ee183baa3744598eeed1fadd39a3bb2c8856dea8327d9ba5a44fd0e010091ff1643cd8ad59e4245379291320dd22f42bced0507e3f2e3d31679dcbbe8efaa98ceeb905bb57cd"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:13 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="850000000700000025000000000000089500000000000000cf86f547728f7fd62efec9bc7cba134e7b06d8491b28add6577ed004c59d08f9b1e2f65227d090dbf4dcadf4621c26a97457f3946534d529cf85b55702a4f804005800f9d115e02475115a3ca275306ec69f21a56631306d7188b9aec032188fe6f6aa75fb6f496624df0ea8c77f2b16173aa4c24644f41a6626f3d7655440e1f0d20e2c5e984756e32bb6fabebc06fcf98097dc4e20e8f6683d4520e141051e8da5e74a0072b6d49ac9efc03f18ab0c92eb849f267e9a88a45d685136bd33b0e3f8400b33b4a1b67ad3ed6c4b161acbb872296c3b0f05b4f1490c6d0cc64454e5a0bea54af3fc6c49f1bc63ae54e0d82f1704d9ffc1545dc37736513e9d412c4a73482241335e3aeb03749826c3e648599a413b46ba3df5dad48836e55d9bc34bf630d3f43a5da5963d53f2527b9e0df2e522f46221186fe7577bc2f4648979b50fb8253a96b393bfe9d735e234d7cdea2a779201cb3e433519b436a99c7c818e0e3fa984f3c89b9ca12ae9458ef2e116f7270de1edad3392c3c622708845ea6e69f6f4a20d7e18db74093919325cc95a4db3000000bff66469201b626b55aac478d06f5e8c54eff0d6011ead14a1ec6078f5de980a3456ff1a31a3a3a2967b0e63c785b12d834da3e1d5984422b21ecc4442ccf4e7a2d478ec8a3de4c9e57ebedbbf568843d001e8ae464ce8bd9faea0dfc6fe437f568ddb8df52559c087eb4e0a4bc81b1363d99d5072795d3209e87cf316588994a5ad04dee870ea9f2437860b9140cee7efe0bfb2220f0b571638765ee1f030f973a2b57fdb64c990500f731b7332b4fba5298c0c0ecdccf4581f0a72ef26845f99f055c784f7f226fcfbf92db65797e6d9c6079f22936a2f48a5e547772ee0718a7f6a61b006a49debdb1e9afc3f9392ff7d41ffbf7ee5eb488c1de1d7abd153ce81db970b4915c6fccbd6eb11328f6d96a59a254f117933bc6340eee771f79f90a5c851c40acc125ac6acd682ac8ef6f393e5a69d034c5b6ebaffca972231f831685ea7eeb2aaa64e0004070bcbb91e545103e6a47180ad68113873ae89560e8241b8e09ffec1dfd566822d495ab4bc2c9a2f16463b80c4c55d3fcdd47ba6478f10a59dae536dce86e97aa8ab91b3314122cecaf1743583de3a7355d063882a917a09c1b3c7d0eef9515d9fcde7582d3978062581368c4073ca0caaa18fb232bb946abdd00de773ed973010b00d43fc4b5263e45f81fd6ebc632f22dad4c75207d7d701a428e7d60a726c8c8528fe6920e8fa5132fb9ef1d0d31edabf947c19480cc44b9e01be1370dcd6fc05327f545bd753ee5b021c76388ff0ac9b072486d654d11c3d2c3be4cf9a50ceb519e95a43a3903bbb2720f73b767a653759ca2ac302d423bd89ab641040ee3200000000d030b25fa0a68d5e732afae80a09801688f8e121dfacd0abb572280230b47f1dc1be0b152a6b5a2a652617026fb8ec66fd0f640168a90d0a440699a88b5d59bd96e2c5a8c67a15f27722695d548f0b900344b36433d7cb88878946500731f8df6ccf9ec2ed12e5e278228f75fcca5381919aef126834c2b53e17635321738f44ece50dc61fb3fd387c39df2caf57ec4efbca44ee183baa3744598eeed1fadd39a3bb2c8856dea8327d9ba5a44fd0e010091ff1643cd8ad59e4245379291320dd22f42bced0507e3f2e3d31679dcbbe8efaa98ceeb905bb57cd"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) [ 53.346286][ T3548] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 53.382109][ T3551] bond0: (slave macvlan2): Error -98 calling set_mac_address 20:00:14 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) [ 53.445694][ T3556] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 53.459800][ T3557] bond0: (slave macvlan2): Error -98 calling set_mac_address 20:00:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:14 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:14 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:14 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) [ 53.639546][ T3567] bond0: (slave macvlan2): Error -98 calling set_mac_address 20:00:14 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r3, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r4 = dup2(r0, r0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) pread64(r6, &(0x7f0000000000)=""/231, 0x200000e7, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="3f79237d869194757dfab01a", @ANYRES32=r0, @ANYBLOB="e9030000000000002e2f66696c653000"]) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xab}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1ff}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020}, 0x4004800) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) process_vm_readv(0x0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/172, 0xac}], 0x10000000000000b6, &(0x7f0000001f00)=[{&(0x7f0000001840)=""/126, 0x2000037e}, {0x0}, {0x0}, {0x0, 0x3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xf1, 0x91, 0x3f, 0x6, 0x0, 0x1f, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0xc401, 0xbf, 0x6, 0x9, 0x80000001, 0x81, 0x9, 0x0, 0x9c8, 0x0, 0x2}, 0x0, 0xf, r6, 0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r10}, @IFLA_MTU={0x8}]}, 0x4c}}, 0x0) 20:00:14 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="850000000700000025000000000000089500000000000000cf86f547728f7fd62efec9bc7cba134e7b06d8491b28add6577ed004c59d08f9b1e2f65227d090dbf4dcadf4621c26a97457f3946534d529cf85b55702a4f804005800f9d115e02475115a3ca275306ec69f21a56631306d7188b9aec032188fe6f6aa75fb6f496624df0ea8c77f2b16173aa4c24644f41a6626f3d7655440e1f0d20e2c5e984756e32bb6fabebc06fcf98097dc4e20e8f6683d4520e141051e8da5e74a0072b6d49ac9efc03f18ab0c92eb849f267e9a88a45d685136bd33b0e3f8400b33b4a1b67ad3ed6c4b161acbb872296c3b0f05b4f1490c6d0cc64454e5a0bea54af3fc6c49f1bc63ae54e0d82f1704d9ffc1545dc37736513e9d412c4a73482241335e3aeb03749826c3e648599a413b46ba3df5dad48836e55d9bc34bf630d3f43a5da5963d53f2527b9e0df2e522f46221186fe7577bc2f4648979b50fb8253a96b393bfe9d735e234d7cdea2a779201cb3e433519b436a99c7c818e0e3fa984f3c89b9ca12ae9458ef2e116f7270de1edad3392c3c622708845ea6e69f6f4a20d7e18db74093919325cc95a4db3000000bff66469201b626b55aac478d06f5e8c54eff0d6011ead14a1ec6078f5de980a3456ff1a31a3a3a2967b0e63c785b12d834da3e1d5984422b21ecc4442ccf4e7a2d478ec8a3de4c9e57ebedbbf568843d001e8ae464ce8bd9faea0dfc6fe437f568ddb8df52559c087eb4e0a4bc81b1363d99d5072795d3209e87cf316588994a5ad04dee870ea9f2437860b9140cee7efe0bfb2220f0b571638765ee1f030f973a2b57fdb64c990500f731b7332b4fba5298c0c0ecdccf4581f0a72ef26845f99f055c784f7f226fcfbf92db65797e6d9c6079f22936a2f48a5e547772ee0718a7f6a61b006a49debdb1e9afc3f9392ff7d41ffbf7ee5eb488c1de1d7abd153ce81db970b4915c6fccbd6eb11328f6d96a59a254f117933bc6340eee771f79f90a5c851c40acc125ac6acd682ac8ef6f393e5a69d034c5b6ebaffca972231f831685ea7eeb2aaa64e0004070bcbb91e545103e6a47180ad68113873ae89560e8241b8e09ffec1dfd566822d495ab4bc2c9a2f16463b80c4c55d3fcdd47ba6478f10a59dae536dce86e97aa8ab91b3314122cecaf1743583de3a7355d063882a917a09c1b3c7d0eef9515d9fcde7582d3978062581368c4073ca0caaa18fb232bb946abdd00de773ed973010b00d43fc4b5263e45f81fd6ebc632f22dad4c75207d7d701a428e7d60a726c8c8528fe6920e8fa5132fb9ef1d0d31edabf947c19480cc44b9e01be1370dcd6fc05327f545bd753ee5b021c76388ff0ac9b072486d654d11c3d2c3be4cf9a50ceb519e95a43a3903bbb2720f73b767a653759ca2ac302d423bd89ab641040ee3200000000d030b25fa0a68d5e732afae80a09801688f8e121dfacd0abb572280230b47f1dc1be0b152a6b5a2a652617026fb8ec66fd0f640168a90d0a440699a88b5d59bd96e2c5a8c67a15f27722695d548f0b900344b36433d7cb88878946500731f8df6ccf9ec2ed12e5e278228f75fcca5381919aef126834c2b53e17635321738f44ece50dc61fb3fd387c39df2caf57ec4efbca44ee183baa3744598eeed1fadd39a3bb2c8856dea8327d9ba5a44fd0e010091ff1643cd8ad59e4245379291320dd22f42bced0507e3f2e3d31679dcbbe8efaa98ceeb905bb57cd"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:14 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L+'}, 0x16, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001180)=ANY=[@ANYBLOB="850000000700000025000000000000089500000000000000cf86f547728f7fd62efec9bc7cba134e7b06d8491b28add6577ed004c59d08f9b1e2f65227d090dbf4dcadf4621c26a97457f3946534d529cf85b55702a4f804005800f9d115e02475115a3ca275306ec69f21a56631306d7188b9aec032188fe6f6aa75fb6f496624df0ea8c77f2b16173aa4c24644f41a6626f3d7655440e1f0d20e2c5e984756e32bb6fabebc06fcf98097dc4e20e8f6683d4520e141051e8da5e74a0072b6d49ac9efc03f18ab0c92eb849f267e9a88a45d685136bd33b0e3f8400b33b4a1b67ad3ed6c4b161acbb872296c3b0f05b4f1490c6d0cc64454e5a0bea54af3fc6c49f1bc63ae54e0d82f1704d9ffc1545dc37736513e9d412c4a73482241335e3aeb03749826c3e648599a413b46ba3df5dad48836e55d9bc34bf630d3f43a5da5963d53f2527b9e0df2e522f46221186fe7577bc2f4648979b50fb8253a96b393bfe9d735e234d7cdea2a779201cb3e433519b436a99c7c818e0e3fa984f3c89b9ca12ae9458ef2e116f7270de1edad3392c3c622708845ea6e69f6f4a20d7e18db74093919325cc95a4db3000000bff66469201b626b55aac478d06f5e8c54eff0d6011ead14a1ec6078f5de980a3456ff1a31a3a3a2967b0e63c785b12d834da3e1d5984422b21ecc4442ccf4e7a2d478ec8a3de4c9e57ebedbbf568843d001e8ae464ce8bd9faea0dfc6fe437f568ddb8df52559c087eb4e0a4bc81b1363d99d5072795d3209e87cf316588994a5ad04dee870ea9f2437860b9140cee7efe0bfb2220f0b571638765ee1f030f973a2b57fdb64c990500f731b7332b4fba5298c0c0ecdccf4581f0a72ef26845f99f055c784f7f226fcfbf92db65797e6d9c6079f22936a2f48a5e547772ee0718a7f6a61b006a49debdb1e9afc3f9392ff7d41ffbf7ee5eb488c1de1d7abd153ce81db970b4915c6fccbd6eb11328f6d96a59a254f117933bc6340eee771f79f90a5c851c40acc125ac6acd682ac8ef6f393e5a69d034c5b6ebaffca972231f831685ea7eeb2aaa64e0004070bcbb91e545103e6a47180ad68113873ae89560e8241b8e09ffec1dfd566822d495ab4bc2c9a2f16463b80c4c55d3fcdd47ba6478f10a59dae536dce86e97aa8ab91b3314122cecaf1743583de3a7355d063882a917a09c1b3c7d0eef9515d9fcde7582d3978062581368c4073ca0caaa18fb232bb946abdd00de773ed973010b00d43fc4b5263e45f81fd6ebc632f22dad4c75207d7d701a428e7d60a726c8c8528fe6920e8fa5132fb9ef1d0d31edabf947c19480cc44b9e01be1370dcd6fc05327f545bd753ee5b021c76388ff0ac9b072486d654d11c3d2c3be4cf9a50ceb519e95a43a3903bbb2720f73b767a653759ca2ac302d423bd89ab641040ee3200000000d030b25fa0a68d5e732afae80a09801688f8e121dfacd0abb572280230b47f1dc1be0b152a6b5a2a652617026fb8ec66fd0f640168a90d0a440699a88b5d59bd96e2c5a8c67a15f27722695d548f0b900344b36433d7cb88878946500731f8df6ccf9ec2ed12e5e278228f75fcca5381919aef126834c2b53e17635321738f44ece50dc61fb3fd387c39df2caf57ec4efbca44ee183baa3744598eeed1fadd39a3bb2c8856dea8327d9ba5a44fd0e010091ff1643cd8ad59e4245379291320dd22f42bced0507e3f2e3d31679dcbbe8efaa98ceeb905bb57cd"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)='9', 0x1}]) 20:00:14 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) [ 54.151141][ T3579] __nla_validate_parse: 10 callbacks suppressed [ 54.151155][ T3579] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 54.169513][ T3579] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 54.190090][ T3579] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:14 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) 20:00:14 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) 20:00:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) [ 54.223220][ T3581] bond0: (slave macvlan2): Error -98 calling set_mac_address [ 54.254787][ T3584] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 54.272631][ T3585] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 54.288655][ T3584] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 54.298636][ T3585] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 54.308961][ T3588] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. [ 54.319063][ T3585] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:14 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) 20:00:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x7}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x2093ed6a}, @NFTA_HASH_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 20:00:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:14 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) 20:00:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) [ 54.407203][ T3591] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6800000012000102"], 0x68}}, 0x0) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="480000001000810500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800a000100767863616e00000018000280140001"], 0x48}}, 0x0) 20:00:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x7}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x2093ed6a}, @NFTA_HASH_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 20:00:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x7}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x2093ed6a}, @NFTA_HASH_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 20:00:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x78}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 20:00:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x7}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x2093ed6a}, @NFTA_HASH_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 20:00:15 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x5, 0xffffffffffffffff, 0x0) 20:00:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x78}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 20:00:15 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x5, 0xffffffffffffffff, 0x0) 20:00:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x5, 0xffffffffffffffff, 0x0) 20:00:15 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r3, r1, 0x0) 20:00:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x78}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 20:00:15 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x5, 0xffffffffffffffff, 0x0) 20:00:15 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x5, 0xffffffffffffffff, 0x0) 20:00:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) [ 55.185580][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 55.185593][ T24] audit: type=1400 audit(1639339215.716:149): avc: denied { create } for pid=3638 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 55.212046][ T24] audit: type=1400 audit(1639339215.716:150): avc: denied { getopt } for pid=3638 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 20:00:15 executing program 4: r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x5, 0xffffffffffffffff, 0x0) 20:00:15 executing program 0: r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x5, 0xffffffffffffffff, 0x0) 20:00:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 20:00:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 20:00:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 20:00:15 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x10, 0x78}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 20:00:15 executing program 5: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') [ 55.231847][ T24] audit: type=1400 audit(1639339215.736:151): avc: denied { ioctl } for pid=3651 comm="syz-executor.1" path="socket:[21463]" dev="sockfs" ino=21463 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 20:00:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 20:00:15 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 20:00:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 20:00:15 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 0: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 5: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 0: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:15 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 0: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 0: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 5: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 5: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 0: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 5: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 0: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 5: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x2e}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x23) 20:00:16 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 4: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x3}]}]}, 0x4c}}, 0x0) 20:00:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x2e}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x23) 20:00:16 executing program 5: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="7f454c46060307ee07000000000000000300060000080000ac02000038000000bc000000490000000200200001000180140f01000000000005000000f207da68070000000900000000010000030000000600000003000000020000000800000004000000e1ffffffffffffff92dd00000200000000020000f587834c9693eab871638fcb0216b7fe0270a477b9c9512d10be7808991b0060b71f477b73bdc60deddefce6d64080f9c690c29a89d4354566a16502dbaeafe7ea0214c9458b61294e390a72bc03c3c822f99c045b3e049f1775fe7642325e63e1b05eb24d2bac5a0b011af808bcee8a3abf44bb9792c5d10415f2364c4c5ce820ee3eaee57467706c65d8df968d7336fa327e2d382b96423f5aa661a4abf7f31254d0fedf26674f0ac294ebad2e1c77c6c8377cf1be3410c94a0fcbdc639865ae655a62c3937a2aa6b8315cf143d0ed06eb9a861e241881d9a856acd01d61484feda48895a273ac76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a8d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a5c53d9956ef9055b3284885b462ee9b0babd1c719fa91412f53f303bab88ed000000000000000000"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') 20:00:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x3}]}]}, 0x4c}}, 0x0) [ 55.777968][ T24] audit: type=1400 audit(1639339216.306:152): avc: denied { create } for pid=3747 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 20:00:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x3}]}]}, 0x4c}}, 0x0) 20:00:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x2e}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x23) 20:00:16 executing program 3: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x961) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xffffffffffff52c3, 0xb6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf401}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd06009341", 0x6}], 0x1000000000000006, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000440)="c01f8231d59a08eb0d53ab30db876f5aa70d8e2a4bf66392a1e8b562d9db69cf20b736b53a7bb267241fb27cd988085b02cba56f3322dc52de909407f4aacc7f888d16b20e066c3af9bca1933251582a3e6dc6aefade24df6ff2e72b330ab0c49029ca961020a65c5b7383e1503f9dadbf5329f5e4f07560ff6656494c6b1ae13fb59966fc790aa9f906eee114df367dbb7288d92524e965f787888da56cdc43d68cbf886cf08b0cc10de9d4dd4c57f907a0e3b073ccf3e32ff52528b14e9dedf15bcba14f3caef3a7c76b3960ce711924402acdd99786c3bd222c5782d1a73322728b78e98172", 0xe7}, {&(0x7f0000000540)="c4c1cf78ac5083b255e6caecf74ae9c1ed319951134fc9b91c7fc4316e32215c4eef7db2c9fc2e9c24bf64a1d7dd813f2c24be1580850e50d1706e9f35a404c78bfe8bd237fe384af7c94e95d8b3dea2485750fadd28c2063f95256f27efb3b3a004237c4e50cedfdbfd2da81742a4e7779d2e9ef4ae4b5b40a3d376f42db88263d0752f85f2ce6a005e11c19925ebb54220bf2eef035a0b49f7845d94466d511f98e5eb5548aabafb12919d08fb668625f2834a2e9b69d6d9a8e092c1df583c530e74577ed1468ea53327f62da420f37210612098512e4724ebde81bc138634473912d53c260233b7e351ad2f305bc78c", 0xf1}], 0x2) mmap(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000900), 0x2, 0x0) pread64(r3, &(0x7f0000000940)=""/19, 0x13, 0x1) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendfile(r1, r4, &(0x7f0000000400)=0x5, 0xffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}, {@uname={'uname', 0x3d, '%('}}, {@afid={'afid', 0x3d, 0x1000}}, {@cache_none}, {@mmap}], [{@euid_lt={'euid<', r6}}, {@subj_role={'subj_role', 0x3d, '#3).-!!'}}, {@obj_role}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/{]/'}}, {@dont_hash}, {@fowner_gt={'fowner>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '-@\a+M]\\'}}, {@fowner_gt}]}}) signalfd4(r3, &(0x7f0000000100)={[0x9]}, 0x8, 0x80000) r7 = syz_open_dev$ptys(0xc, 0x3, 0x0) fremovexattr(r7, &(0x7f00000003c0)=@known='security.selinux\x00') [ 55.818327][ T3755] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 3, id = 0 [ 55.850006][ T24] audit: type=1400 audit(1639339216.346:153): avc: denied { connect } for pid=3747 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 55.869951][ T24] audit: type=1400 audit(1639339216.346:154): avc: denied { setopt } for pid=3747 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 55.889677][ T24] audit: type=1400 audit(1639339216.346:155): avc: denied { ioctl } for pid=3747 comm="syz-executor.5" path="socket:[23565]" dev="sockfs" ino=23565 ioctlcmd=0x890c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 20:00:16 executing program 5: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x3}]}]}, 0x4c}}, 0x0) 20:00:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x2e}]}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x23) 20:00:16 executing program 5: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x3}]}]}, 0x4c}}, 0x0) 20:00:16 executing program 2: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x3}]}]}, 0x4c}}, 0x0) [ 55.914864][ T24] audit: type=1400 audit(1639339216.346:156): avc: denied { write } for pid=3747 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 20:00:16 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 2: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 5: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="a785f1e190da08281a122cc7078e306ed00437c0aed3bfc74609ccd2b9fe9d515b365712dfd3c9bee7054fcbf5956b6415e5372cde19f90b65dff8f41b8fde427450356d87e7dbfca78c42e793e197de3598eb178569bc963b4267ae1ae9f590f3861fc29bd3335158e5d1c422503bede3431798dcd427c81cc789b9de120215e3a0c4f22e62188ebf425133591be4b2b032d8212b305ac897bd10d760c5b6590798424bf1dd9375440e42e2b890494734adb8a9d7091c448fd82a374a632440dc21d1c8d3de1fa4cdf8fdb75a83640bd6a81c10df8e2a698ecf4243f450069b0a8c80f99d2ebbc5106cfeef99d20b6c97928734f0d74231334201c92a", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x3}]}]}, 0x4c}}, 0x0) 20:00:16 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 2: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) [ 55.994397][ T3778] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 3, id = 0 [ 56.008243][ T3781] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 3, id = 0 20:00:16 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 5: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="a785f1e190da08281a122cc7078e306ed00437c0aed3bfc74609ccd2b9fe9d515b365712dfd3c9bee7054fcbf5956b6415e5372cde19f90b65dff8f41b8fde427450356d87e7dbfca78c42e793e197de3598eb178569bc963b4267ae1ae9f590f3861fc29bd3335158e5d1c422503bede3431798dcd427c81cc789b9de120215e3a0c4f22e62188ebf425133591be4b2b032d8212b305ac897bd10d760c5b6590798424bf1dd9375440e42e2b890494734adb8a9d7091c448fd82a374a632440dc21d1c8d3de1fa4cdf8fdb75a83640bd6a81c10df8e2a698ecf4243f450069b0a8c80f99d2ebbc5106cfeef99d20b6c97928734f0d74231334201c92a", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) [ 56.048909][ T3789] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 3, id = 0 [ 56.065765][ T3791] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 3, id = 0 20:00:16 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:16 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 5: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="a785f1e190da08281a122cc7078e306ed00437c0aed3bfc74609ccd2b9fe9d515b365712dfd3c9bee7054fcbf5956b6415e5372cde19f90b65dff8f41b8fde427450356d87e7dbfca78c42e793e197de3598eb178569bc963b4267ae1ae9f590f3861fc29bd3335158e5d1c422503bede3431798dcd427c81cc789b9de120215e3a0c4f22e62188ebf425133591be4b2b032d8212b305ac897bd10d760c5b6590798424bf1dd9375440e42e2b890494734adb8a9d7091c448fd82a374a632440dc21d1c8d3de1fa4cdf8fdb75a83640bd6a81c10df8e2a698ecf4243f450069b0a8c80f99d2ebbc5106cfeef99d20b6c97928734f0d74231334201c92a", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:00:16 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "a72dd63548d8e39d53d6fe4397c27f0659dce6eaa0201048f48aa647e68297719810e9623bb34a2c96f10b2d8b37d89025ece8c90a38fb073ba177f851ead79984f5d1ca3890b55768ef6b49b6533d3c1d88699ba9bdfef1c96839a3b0995571104ce5964cae46945d4a09248966d3c2c9812dcaf47c3f0aa62b449c6e1ded04ebad518a4c7a2874785e83c10bdd206bd3313f594a367e1d07bbfd9828765c0aa38f603f0749b378f64a1d0ad620ea16d48eb6d50ae7f08a90064833bed4d4aea21cf49bc959a201f9f45f47a704f7f2448a357f21d759fd2194656798425ceccc1256b03f00f0153acd37206da33a9fc1354f5f66d8ff31d7cdf62dc3858d9b766ac3498715e624a219414c916ea439d0882bedc288b3804454051e5e38cc3ff0d7e3a74745bfdb9855fd00d5ac009d5c946e9b9cd3446248d4ed7e16805b36c30acd794a9f38ae006a616d7adc628e5062dafb27bf580cf2eff7fda6cdf953e62265b5232b3dc402be40d35eef76ac55901e5547faa3d6242eaafbaf97914fc29c68e178e35ba695b57e3d57999b4ce0bdf0190ad1e9e4db4d25b0cfaa4858b198d95ff19e6922c86373579ace88df9bf0eb73f26bf9a1a40f9de0155a50bd16737619378ae5c513f51c87aacce11646b8cee94de5ea429a7713bfb79ec8c71d3d72afba542300ceda96b8516ccddf869d5e41283fa0e9d33167f7fca93edb"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) [ 56.145562][ T3810] IPVS: sync thread started: state = BACKUP, mcast_ifn = dummy0, syncid = 3, id = 0 20:00:16 executing program 3: getcwd(&(0x7f0000000000)=""/116, 0x74) 20:00:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:00:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:16 executing program 5: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="a785f1e190da08281a122cc7078e306ed00437c0aed3bfc74609ccd2b9fe9d515b365712dfd3c9bee7054fcbf5956b6415e5372cde19f90b65dff8f41b8fde427450356d87e7dbfca78c42e793e197de3598eb178569bc963b4267ae1ae9f590f3861fc29bd3335158e5d1c422503bede3431798dcd427c81cc789b9de120215e3a0c4f22e62188ebf425133591be4b2b032d8212b305ac897bd10d760c5b6590798424bf1dd9375440e42e2b890494734adb8a9d7091c448fd82a374a632440dc21d1c8d3de1fa4cdf8fdb75a83640bd6a81c10df8e2a698ecf4243f450069b0a8c80f99d2ebbc5106cfeef99d20b6c97928734f0d74231334201c92a", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:00:16 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff, @private1}], 0x1c) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'dummy0\x00', 0x3}, 0x18) setsockopt$inet_int(r3, 0x0, 0x1, &(0x7f0000000080)=0xd6de7efc, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000bc0)={0x0, @can={0x1d, 0x0}, @can, @ax25={0x3, @default, 0x5}, 0xff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x2, 0xf11}) sendmmsg$inet(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="30fde09039a250748c507dcd0541ba881582badec0d0c48cabb1a91c5319277c608e01fa587efe02c312f01a66623fbefbe6dbad69d3a3a747dad4cce9f9cf7b9b41049e7260ffe00922567ab6ee4164b58b9566afeace50247921de34e18c5aea58e79c3f520bd8f98ef14e126baef3fff02117630377db733112d8e8870fb74bdab4fd9e99cf4a218145b8e51c90dd5fea8f6b506784a9", 0x98}, {&(0x7f00000003c0)="54afd7b578fca39ebbe81f7f1727685ccf54de61088145c45bffb5f882e1a48ff5a4a42224a2a0c83dac6c662ec0df1414336707589c2f5597b744f4a6d0fae15b2010ea233213a4efb495ab7fee6248e74f9503eb5e9fc5659c1d674665291b2752db72010b9b40beeb19b3a5c289ad7ef62cd978fe879d625e762f97d3e96f01dccc933c2300853cb9bea59a4efe2cdbbbfed5debe8c07c12b63bc8727e27b3f2b05d03e974b66cef8dc87682909b24248f07e810f82c58ae9a55bbc2e0f4285ec17cbb2bf0f", 0xc7}, {&(0x7f00000004c0)="906b41fa1e73c34084c9e4d1fbc2f90eacde81c8da3f5f635c861ae8f7ba43908ea003e41a32963f5c2dbffa97d5f5798ffa31ee68d7731945066d293ad941b5bb595459bdd50346376e2dca88434eaf6d0b6c0e4f43853116beb5e72fae1cc3976a0df04270507190db5707ab6df22c7a3146a1983b8d062a5f850ec77f53dfb6499f93c4baa398d47f95945558027b6fe9b571c40b09e4f51b333a4066887f7ebe7bfba2f39b970079f9d2c647325767679331a4687f7b666f0a5526e4cda31d7d2a4ed5c95784974489ee01409685467970c72dc7b4a8d2561542fa28976df3646a301ca952206e14b16f818bb451", 0xf0}], 0x3, &(0x7f0000000280)}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="89ae7fef13fe2c3a19e70cacdc47c7a69fe13479edab2db51c16f3a33bc7dc67002a73d3f61b780caea194b9f4a5c1a31a8201c4a523173435e7deb9e61c900fd8c901ff364855796f045345e28e615baabbf9bea0882c830b7dce7b9c0ae4d2925885b22582a1ba4504faff9d56f0e00abda6084612203b72dd3f031a59d781482632bba90b8cfcc552c8e65020aa9608be709d32d0bb645f", 0x99}, {&(0x7f0000000680)="18697b4e4c7c3833114022fa86111ece9460e846fd9c79fe9b653d77009f1f8a97973fba251b999b04f39fbd96277345b99ce783be0b39aabd9b1197c44e252f30ea676fbb769d92f0f42c30c668d21014164aacbdb4b4075fc4b5", 0x5b}, {&(0x7f0000000700)="944c43fb2d926f204caf3f77cd04ba731ce94030cc371287361c5272755bd1edd17caeb9145be3c3e2b9b6a769d34f6a14207ff6c5b246bfb67a95217e3594d58410f820aa91e2b1cd67939dff9f9c5ff090fc2f0d0e90e74cc6891fedb0359e1495cbcea52c0d69cae41b911897c5069c413fdc8eaeb7645448ac332e7f3c0ede395e01b276fbf2b5604cd6a0c03e57f8719a59b6054043be08b1229a872db3baa0596a66b00431f849dee88b14b9b954cd5e5ea1e97b17057b82c0ae2d6695606153c677a6fce4cb27", 0xca}, {&(0x7f0000000800)="a785f1e190da08281a122cc7078e306ed00437c0aed3bfc74609ccd2b9fe9d515b365712dfd3c9bee7054fcbf5956b6415e5372cde19f90b65dff8f41b8fde427450356d87e7dbfca78c42e793e197de3598eb178569bc963b4267ae1ae9f590f3861fc29bd3335158e5d1c422503bede3431798dcd427c81cc789b9de120215e3a0c4f22e62188ebf425133591be4b2b032d8212b305ac897bd10d760c5b6590798424bf1dd9375440e42e2b890494734adb8a9d7091c448fd82a374a632440dc21d1c8d3de1fa4cdf8fdb75a83640bd6a81c10df8e2a698ecf4243f450069b0a8c80f99d2ebbc5106cfeef99d20b6c97928734f0d74231334201c92a", 0xfd}, {&(0x7f0000000900)="f3326094feb843a78163a2ed113a3c9a6f85c4f5fce9b289704145e870121b2c3323cd1e10cf7d56cf0579690589b901b1f22eb22a484f170b643d83dc36b866ea270405c13f0140090258f69081cd56431470c0041f269621c226deeb878155745d0b30d021504055467b126bb6fa8c5441ab4ef2853ba30ccf", 0x7a}, {&(0x7f00000002c0)}], 0x6}}, {{&(0x7f0000000a00)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a40)="c7d74fae3410352990abfee08f0072d0e9e96c244ec1625cfc92db1ff32c29d33a122bf46abefaabf2ee5808f0fc9960f91c969fc2d829cecece8b4e8ea5cc6ce25ad5b2a6e1c0f389b0867ec6644af88303a83599ad0d0e9c39fa751b08cd143eb7d0a9a016c56cd4e8d37a37e30b2beaa2329d2ec974cd66f0e8979649755e2ca3b7021199f2ff6bbaa374180239e8dafdd8c77e368f569fb8cab4004d9992ada25a", 0xa3}, {&(0x7f0000000b00)="787a362d5b01fec348ee14ceba6a46fb1089e939932269b8059de4e6cc7f87665987b6a73cedcd8012ee7e75db35f6009b0d4741a84e892d6c1cf65159ac1dba0490e9974921183510080855c3ab538a22bc4422a85c9b78f9207b9252eb78f441a6fe85b37ec69721f7e63c28", 0x6d}], 0x2, &(0x7f0000000c40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff0000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @loopback}}}], 0x80}}, {{&(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000d00)="f6155def7354721f50ea4706d29011f5c913cfe0ac9a9e09c5", 0x19}, {&(0x7f0000000d40)="7812a438b3a02b73869df4b1a5f5d85dc4b9bf2d870cf7f49ea02db72fdbe17b9c3340479959f09795535aab60429f37d353ba1c7b94ec93b62818d8182d14861e9c2f380bdedbdfba4e88eefa9f2af2e94e97b883ed37f93f87492a7426cb2d8a81e6b99cc28b1ebec90aba48f15d7dd271d44f86e5df77afb18666b956f13a3443e608870c755618ee4d2950984620db1ea746fa5d1fb3aa625f247b8d890df57b5f487d505439c510abb76e4399a98bccd0081a568d812ac841022976d6e492cd251dbd12a51f107fa7d1742ea9dafdd484812982d724f06a1817588441b920dafab2", 0xe4}], 0x2, &(0x7f0000000e80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7819}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0x5e, 0x1, 0x8, [{@local, 0x200}, {@empty, 0xc0000000}, {@loopback, 0x3ff}, {@rand_addr=0x64010101, 0x5}, {@broadcast, 0x5}, {@private=0xa010101}, {@loopback, 0x8201}, {@private=0xa010102, 0x9}, {@empty, 0x1}]}, @noop]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp_prespec={0x44, 0xc, 0xa, 0x3, 0x0, [{@local, 0x2}]}]}}}], 0xd8}}], 0x4, 0x20044040) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x7d, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xe85, 0x401, 0x20a, 0xffffffff, 0x9, 0x0, 0xc16, 0x5}, 0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) [ 56.183985][ T24] audit: type=1400 audit(1639339216.716:157): avc: denied { create } for pid=3815 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 56.217493][ T3823] €: renamed from ipvlan1 20:00:16 executing program 3: getcwd(&(0x7f0000000000)=""/116, 0x74) 20:00:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 56.251418][ T24] audit: type=1400 audit(1639339216.736:158): avc: denied { bind } for pid=3815 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 56.279558][ T3823] bridge0: port 3(bond0) entered blocking state [ 56.285939][ T3823] bridge0: port 3(bond0) entered disabled state 20:00:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:16 executing program 3: getcwd(&(0x7f0000000000)=""/116, 0x74) 20:00:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 56.305730][ T3823] device bond0 entered promiscuous mode [ 56.311338][ T3823] device bond_slave_0 entered promiscuous mode [ 56.317699][ T3823] device bond_slave_1 entered promiscuous mode [ 56.328838][ T3823] bridge0: port 3(bond0) entered blocking state [ 56.335185][ T3823] bridge0: port 3(bond0) entered forwarding state 20:00:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:16 executing program 3: getcwd(&(0x7f0000000000)=""/116, 0x74) 20:00:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 56.356567][ T3823] device bond0 left promiscuous mode [ 56.362114][ T3823] device bond_slave_0 left promiscuous mode [ 56.368418][ T3823] device bond_slave_1 left promiscuous mode [ 56.374641][ T3823] bridge0: port 3(bond0) entered disabled state 20:00:16 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "a72dd63548d8e39d53d6fe4397c27f0659dce6eaa0201048f48aa647e68297719810e9623bb34a2c96f10b2d8b37d89025ece8c90a38fb073ba177f851ead79984f5d1ca3890b55768ef6b49b6533d3c1d88699ba9bdfef1c96839a3b0995571104ce5964cae46945d4a09248966d3c2c9812dcaf47c3f0aa62b449c6e1ded04ebad518a4c7a2874785e83c10bdd206bd3313f594a367e1d07bbfd9828765c0aa38f603f0749b378f64a1d0ad620ea16d48eb6d50ae7f08a90064833bed4d4aea21cf49bc959a201f9f45f47a704f7f2448a357f21d759fd2194656798425ceccc1256b03f00f0153acd37206da33a9fc1354f5f66d8ff31d7cdf62dc3858d9b766ac3498715e624a219414c916ea439d0882bedc288b3804454051e5e38cc3ff0d7e3a74745bfdb9855fd00d5ac009d5c946e9b9cd3446248d4ed7e16805b36c30acd794a9f38ae006a616d7adc628e5062dafb27bf580cf2eff7fda6cdf953e62265b5232b3dc402be40d35eef76ac55901e5547faa3d6242eaafbaf97914fc29c68e178e35ba695b57e3d57999b4ce0bdf0190ad1e9e4db4d25b0cfaa4858b198d95ff19e6922c86373579ace88df9bf0eb73f26bf9a1a40f9de0155a50bd16737619378ae5c513f51c87aacce11646b8cee94de5ea429a7713bfb79ec8c71d3d72afba542300ceda96b8516ccddf869d5e41283fa0e9d33167f7fca93edb"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:16 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:16 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:00:17 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:17 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 56.481248][ T3864] €: renamed from ipvlan1 20:00:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ftruncate(r0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 20:00:17 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) [ 56.506791][ T3864] bridge0: port 3(bond0) entered blocking state [ 56.513167][ T3864] bridge0: port 3(bond0) entered disabled state 20:00:17 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) [ 56.555130][ T3864] device bond0 entered promiscuous mode [ 56.560802][ T3864] device bond_slave_0 entered promiscuous mode [ 56.567370][ T3864] device bond_slave_1 entered promiscuous mode [ 56.574198][ T3864] bridge0: port 3(bond0) entered blocking state [ 56.580580][ T3864] bridge0: port 3(bond0) entered forwarding state [ 56.587597][ T3882] bridge0: port 3(bond0) entered blocking state [ 56.593937][ T3882] bridge0: port 3(bond0) entered disabled state [ 56.601431][ T3882] device bond0 entered promiscuous mode [ 56.606973][ T3882] device bond_slave_0 entered promiscuous mode [ 56.613342][ T3882] device bond_slave_1 entered promiscuous mode [ 56.619959][ T3882] bridge0: port 3(bond0) entered blocking state [ 56.626441][ T3882] bridge0: port 3(bond0) entered forwarding state [ 56.634004][ T3870] bridge0: port 3(bond0) entered blocking state [ 56.640454][ T3870] bridge0: port 3(bond0) entered disabled state [ 56.647247][ T3870] device bond0 entered promiscuous mode [ 56.652851][ T3870] device bond_slave_0 entered promiscuous mode [ 56.659100][ T3870] device bond_slave_1 entered promiscuous mode [ 56.665473][ T3870] bridge0: port 3(bond0) entered blocking state [ 56.672331][ T3870] bridge0: port 3(bond0) entered forwarding state [ 56.679084][ T3874] €: renamed from ipvlan1 [ 56.685134][ T3879] €: renamed from ipvlan1 [ 56.691136][ T3881] €: renamed from ipvlan1 [ 56.699962][ T3877] device bond0 left promiscuous mode [ 56.705276][ T3877] device bond_slave_0 left promiscuous mode [ 56.711280][ T3877] device bond_slave_1 left promiscuous mode [ 56.717308][ T3877] bridge0: port 3(bond0) entered disabled state [ 56.724704][ T3883] device bond0 left promiscuous mode [ 56.730235][ T3883] device bond_slave_0 left promiscuous mode [ 56.736195][ T3883] device bond_slave_1 left promiscuous mode [ 56.742299][ T3883] bridge0: port 3(bond0) entered disabled state [ 56.750555][ T3884] bridge0: port 3(bond0) entered blocking state [ 56.756859][ T3884] bridge0: port 3(bond0) entered disabled state [ 56.764237][ T3884] device bond0 entered promiscuous mode [ 56.769795][ T3884] device bond_slave_0 entered promiscuous mode [ 56.776041][ T3884] device bond_slave_1 entered promiscuous mode [ 56.782558][ T3884] bridge0: port 3(bond0) entered blocking state [ 56.788813][ T3884] bridge0: port 3(bond0) entered forwarding state [ 56.795441][ T3886] device bond0 left promiscuous mode 20:00:17 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "a72dd63548d8e39d53d6fe4397c27f0659dce6eaa0201048f48aa647e68297719810e9623bb34a2c96f10b2d8b37d89025ece8c90a38fb073ba177f851ead79984f5d1ca3890b55768ef6b49b6533d3c1d88699ba9bdfef1c96839a3b0995571104ce5964cae46945d4a09248966d3c2c9812dcaf47c3f0aa62b449c6e1ded04ebad518a4c7a2874785e83c10bdd206bd3313f594a367e1d07bbfd9828765c0aa38f603f0749b378f64a1d0ad620ea16d48eb6d50ae7f08a90064833bed4d4aea21cf49bc959a201f9f45f47a704f7f2448a357f21d759fd2194656798425ceccc1256b03f00f0153acd37206da33a9fc1354f5f66d8ff31d7cdf62dc3858d9b766ac3498715e624a219414c916ea439d0882bedc288b3804454051e5e38cc3ff0d7e3a74745bfdb9855fd00d5ac009d5c946e9b9cd3446248d4ed7e16805b36c30acd794a9f38ae006a616d7adc628e5062dafb27bf580cf2eff7fda6cdf953e62265b5232b3dc402be40d35eef76ac55901e5547faa3d6242eaafbaf97914fc29c68e178e35ba695b57e3d57999b4ce0bdf0190ad1e9e4db4d25b0cfaa4858b198d95ff19e6922c86373579ace88df9bf0eb73f26bf9a1a40f9de0155a50bd16737619378ae5c513f51c87aacce11646b8cee94de5ea429a7713bfb79ec8c71d3d72afba542300ceda96b8516ccddf869d5e41283fa0e9d33167f7fca93edb"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:17 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:00:17 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) [ 56.800770][ T3886] device bond_slave_0 left promiscuous mode [ 56.806704][ T3886] device bond_slave_1 left promiscuous mode [ 56.812861][ T3886] bridge0: port 3(bond0) entered disabled state [ 56.826670][ T3887] bridge0: port 3(bond0) entered blocking state [ 56.832976][ T3887] bridge0: port 3(bond0) entered disabled state [ 56.845449][ T3887] device bond0 entered promiscuous mode 20:00:17 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:00:17 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xc) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xaa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:00:17 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) [ 56.851121][ T3887] device bond_slave_0 entered promiscuous mode [ 56.857310][ T3887] device bond_slave_1 entered promiscuous mode [ 56.869102][ T3887] bridge0: port 3(bond0) entered blocking state [ 56.875391][ T3887] bridge0: port 3(bond0) entered forwarding state [ 56.889695][ T3889] device bond0 left promiscuous mode [ 56.895015][ T3889] device bond_slave_0 left promiscuous mode [ 56.900970][ T3889] device bond_slave_1 left promiscuous mode 20:00:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f00000022c0), 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) 20:00:17 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f00000022c0), 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) [ 56.907052][ T3889] bridge0: port 3(bond0) entered disabled state [ 56.917230][ T3881] device bond0 left promiscuous mode [ 56.922766][ T3881] device bond_slave_0 left promiscuous mode [ 56.928906][ T3881] device bond_slave_1 left promiscuous mode [ 56.935150][ T3881] bridge0: port 3(bond0) entered disabled state 20:00:17 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f00000022c0), 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) [ 56.975048][ T3903] bridge0: port 3(bond0) entered blocking state [ 56.981383][ T3903] bridge0: port 3(bond0) entered disabled state [ 56.993421][ T3903] device bond0 entered promiscuous mode [ 56.999171][ T3903] device bond_slave_0 entered promiscuous mode [ 57.005382][ T3903] device bond_slave_1 entered promiscuous mode 20:00:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f00000022c0), 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) [ 57.023088][ T3903] bridge0: port 3(bond0) entered blocking state [ 57.029488][ T3903] bridge0: port 3(bond0) entered forwarding state [ 57.036130][ T3915] bridge0: port 3(bond0) entered blocking state [ 57.042442][ T3915] bridge0: port 3(bond0) entered disabled state [ 57.051780][ T3915] device bond0 entered promiscuous mode [ 57.057345][ T3915] device bond_slave_0 entered promiscuous mode [ 57.063655][ T3915] device bond_slave_1 entered promiscuous mode [ 57.071196][ T3915] bridge0: port 3(bond0) entered blocking state [ 57.077463][ T3915] bridge0: port 3(bond0) entered forwarding state [ 57.085433][ T3894] device bond0 left promiscuous mode [ 57.091614][ T3894] device bond_slave_0 left promiscuous mode [ 57.097606][ T3894] device bond_slave_1 left promiscuous mode [ 57.103750][ T3894] bridge0: port 3(bond0) entered disabled state [ 57.112129][ T3925] bridge0: port 3(bond0) entered blocking state [ 57.118512][ T3925] bridge0: port 3(bond0) entered disabled state [ 57.125607][ T3925] device bond0 entered promiscuous mode [ 57.131274][ T3925] device bond_slave_0 entered promiscuous mode [ 57.137468][ T3925] device bond_slave_1 entered promiscuous mode [ 57.144142][ T3925] bridge0: port 3(bond0) entered blocking state [ 57.150519][ T3925] bridge0: port 3(bond0) entered forwarding state [ 57.157138][ T3904] bridge0: port 3(bond0) entered blocking state [ 57.163440][ T3904] bridge0: port 3(bond0) entered disabled state [ 57.170178][ T3904] device bond0 entered promiscuous mode [ 57.175717][ T3904] device bond_slave_0 entered promiscuous mode [ 57.181951][ T3904] device bond_slave_1 entered promiscuous mode [ 57.189496][ T3904] bridge0: port 3(bond0) entered blocking state [ 57.195758][ T3904] bridge0: port 3(bond0) entered forwarding state [ 57.202445][ T3898] device bond0 left promiscuous mode [ 57.207863][ T3898] device bond_slave_0 left promiscuous mode [ 57.213872][ T3898] device bond_slave_1 left promiscuous mode [ 57.220151][ T3898] bridge0: port 3(bond0) entered disabled state [ 57.228206][ T3906] device bond0 left promiscuous mode [ 57.233529][ T3906] device bond_slave_0 left promiscuous mode [ 57.239500][ T3906] device bond_slave_1 left promiscuous mode [ 57.245596][ T3906] bridge0: port 3(bond0) entered disabled state [ 57.252737][ T3931] bridge0: port 3(bond0) entered blocking state [ 57.259210][ T3931] bridge0: port 3(bond0) entered disabled state [ 57.266148][ T3931] device bond0 entered promiscuous mode [ 57.271721][ T3931] device bond_slave_0 entered promiscuous mode [ 57.277908][ T3931] device bond_slave_1 entered promiscuous mode [ 57.284619][ T3931] bridge0: port 3(bond0) entered blocking state [ 57.291009][ T3931] bridge0: port 3(bond0) entered forwarding state [ 57.297668][ T3932] device bond0 left promiscuous mode [ 57.302977][ T3932] device bond_slave_0 left promiscuous mode [ 57.308987][ T3932] device bond_slave_1 left promiscuous mode [ 57.314951][ T3932] bridge0: port 3(bond0) entered disabled state 20:00:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 20:00:17 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "a72dd63548d8e39d53d6fe4397c27f0659dce6eaa0201048f48aa647e68297719810e9623bb34a2c96f10b2d8b37d89025ece8c90a38fb073ba177f851ead79984f5d1ca3890b55768ef6b49b6533d3c1d88699ba9bdfef1c96839a3b0995571104ce5964cae46945d4a09248966d3c2c9812dcaf47c3f0aa62b449c6e1ded04ebad518a4c7a2874785e83c10bdd206bd3313f594a367e1d07bbfd9828765c0aa38f603f0749b378f64a1d0ad620ea16d48eb6d50ae7f08a90064833bed4d4aea21cf49bc959a201f9f45f47a704f7f2448a357f21d759fd2194656798425ceccc1256b03f00f0153acd37206da33a9fc1354f5f66d8ff31d7cdf62dc3858d9b766ac3498715e624a219414c916ea439d0882bedc288b3804454051e5e38cc3ff0d7e3a74745bfdb9855fd00d5ac009d5c946e9b9cd3446248d4ed7e16805b36c30acd794a9f38ae006a616d7adc628e5062dafb27bf580cf2eff7fda6cdf953e62265b5232b3dc402be40d35eef76ac55901e5547faa3d6242eaafbaf97914fc29c68e178e35ba695b57e3d57999b4ce0bdf0190ad1e9e4db4d25b0cfaa4858b198d95ff19e6922c86373579ace88df9bf0eb73f26bf9a1a40f9de0155a50bd16737619378ae5c513f51c87aacce11646b8cee94de5ea429a7713bfb79ec8c71d3d72afba542300ceda96b8516ccddf869d5e41283fa0e9d33167f7fca93edb"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:17 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 20:00:17 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) [ 57.322072][ T3934] device bond0 left promiscuous mode [ 57.327368][ T3934] device bond_slave_0 left promiscuous mode [ 57.333404][ T3934] device bond_slave_1 left promiscuous mode [ 57.339481][ T3934] bridge0: port 3(bond0) entered disabled state 20:00:17 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) 20:00:17 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 20:00:17 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0x9, 0x0, 0xf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r2) perf_event_open(0x0, 0x0, 0x200000000b, 0xffffffffffffffff, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000003c0)={0x2, "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd, 0x8, 0x1fc, 0x40, 0x0, 0x1, {0x2}}, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000200)={'ipvlan1\x00', @ifru_data=&(0x7f0000000180)="3b3e23da2242ff0f000000000000cdfacc0c800bd58f0129e10422bce0be8f1a"}) ioctl$sock_ifreq(r1, 0x89a2, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r4 = perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ifreq(r5, 0x89a3, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3f, 0x1f, 0x1d, 0x2f, 0x0, 0x10000000004, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaa, 0x2, @perf_config_ext={0xcf, 0x6}, 0x10009, 0xa58, 0x0, 0x4, 0x0, 0x3, 0xfe01, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, r4, 0x2) [ 57.406036][ T3943] bridge0: port 3(bond0) entered blocking state [ 57.412428][ T3943] bridge0: port 3(bond0) entered disabled state [ 57.445172][ T3943] device bond0 entered promiscuous mode 20:00:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 20:00:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) [ 57.450899][ T3943] device bond_slave_0 entered promiscuous mode [ 57.457193][ T3943] device bond_slave_1 entered promiscuous mode [ 57.484416][ T3943] bridge0: port 3(bond0) entered blocking state [ 57.490773][ T3943] bridge0: port 3(bond0) entered forwarding state [ 57.497772][ T3953] bridge0: port 3(bond0) entered blocking state 20:00:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) [ 57.504080][ T3953] bridge0: port 3(bond0) entered disabled state [ 57.512726][ T3953] device bond0 entered promiscuous mode [ 57.518383][ T3953] device bond_slave_0 entered promiscuous mode [ 57.524641][ T3953] device bond_slave_1 entered promiscuous mode [ 57.531665][ T3953] bridge0: port 3(bond0) entered blocking state [ 57.537997][ T3953] bridge0: port 3(bond0) entered forwarding state [ 57.545544][ T3951] bridge0: port 3(bond0) entered blocking state 20:00:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) [ 57.551870][ T3951] bridge0: port 3(bond0) entered disabled state [ 57.558894][ T3951] device bond0 entered promiscuous mode [ 57.564962][ T3951] device bond_slave_0 entered promiscuous mode [ 57.571207][ T3951] device bond_slave_1 entered promiscuous mode [ 57.577562][ T3951] bridge0: port 3(bond0) entered blocking state [ 57.583818][ T3951] bridge0: port 3(bond0) entered forwarding state [ 57.590474][ T3961] bridge0: port 3(bond0) entered blocking state [ 57.596715][ T3961] bridge0: port 3(bond0) entered disabled state [ 57.605701][ T3961] device bond0 entered promiscuous mode [ 57.611290][ T3961] device bond_slave_0 entered promiscuous mode [ 57.617637][ T3961] device bond_slave_1 entered promiscuous mode [ 57.624101][ T3961] bridge0: port 3(bond0) entered blocking state [ 57.630540][ T3961] bridge0: port 3(bond0) entered forwarding state [ 57.637169][ T3965] device bond0 left promiscuous mode [ 57.642542][ T3965] device bond_slave_0 left promiscuous mode [ 57.648474][ T3965] device bond_slave_1 left promiscuous mode [ 57.654553][ T3965] bridge0: port 3(bond0) entered disabled state [ 57.662000][ T3963] device bond0 left promiscuous mode [ 57.667792][ T3963] device bond_slave_0 left promiscuous mode [ 57.673844][ T3963] device bond_slave_1 left promiscuous mode [ 57.679863][ T3963] bridge0: port 3(bond0) entered disabled state [ 57.687380][ T3970] bridge0: port 3(bond0) entered blocking state [ 57.693893][ T3970] bridge0: port 3(bond0) entered disabled state [ 57.700595][ T3970] device bond0 entered promiscuous mode [ 57.706138][ T3970] device bond_slave_0 entered promiscuous mode [ 57.712358][ T3970] device bond_slave_1 entered promiscuous mode [ 57.719196][ T3970] bridge0: port 3(bond0) entered blocking state [ 57.725547][ T3970] bridge0: port 3(bond0) entered forwarding state [ 57.733385][ T3976] device bond0 left promiscuous mode [ 57.738805][ T3976] device bond_slave_0 left promiscuous mode [ 57.744723][ T3976] device bond_slave_1 left promiscuous mode [ 57.750917][ T3976] bridge0: port 3(bond0) entered disabled state 20:00:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 20:00:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newqdisc={0x18c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x15c, 0x2, {{}, [@TCA_NETEM_DELAY_DIST={0x42, 0x2, "c60217d7c779313e0f36faaf83aa3ea25aefd82ee4452818308b33c65fb99b9bde221e32fc012b289b812850f69d016cc88c585ba64fe729067acd9bc9b9"}, @TCA_NETEM_CORR={0x10}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_DELAY_DIST={0x41, 0x2, "a37af558ca714780d0dfe97b6d0416f7b6c20a7d10ca71f1cd29c9407ff1cea8abfc670f2dbb3bebe52c091710f531c3c56d4b2d593181b39d384ee288"}, @TCA_NETEM_RATE={0x14}, @TCA_NETEM_LOSS={0x4}, @TCA_NETEM_CORRUPT={0x25}, @TCA_NETEM_LOSS={0x6c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GE={0x14}]}]}}}]}, 0x18c}}, 0x0) 20:00:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002300)={0x38, r1, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x38}}, 0x0) [ 57.757685][ T3971] device bond0 left promiscuous mode [ 57.763058][ T3971] device bond_slave_0 left promiscuous mode [ 57.769144][ T3971] device bond_slave_1 left promiscuous mode [ 57.775392][ T3971] bridge0: port 3(bond0) entered disabled state 20:00:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002300)={0x38, r1, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x38}}, 0x0) 20:00:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)='W', 0x1}], 0x1, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x10}}], 0x18}, 0x0) 20:00:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 20:00:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x48}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:00:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newqdisc={0x18c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x15c, 0x2, {{}, [@TCA_NETEM_DELAY_DIST={0x42, 0x2, "c60217d7c779313e0f36faaf83aa3ea25aefd82ee4452818308b33c65fb99b9bde221e32fc012b289b812850f69d016cc88c585ba64fe729067acd9bc9b9"}, @TCA_NETEM_CORR={0x10}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_DELAY_DIST={0x41, 0x2, "a37af558ca714780d0dfe97b6d0416f7b6c20a7d10ca71f1cd29c9407ff1cea8abfc670f2dbb3bebe52c091710f531c3c56d4b2d593181b39d384ee288"}, @TCA_NETEM_RATE={0x14}, @TCA_NETEM_LOSS={0x4}, @TCA_NETEM_CORRUPT={0x25}, @TCA_NETEM_LOSS={0x6c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GE={0x14}]}]}}}]}, 0x18c}}, 0x0) [ 57.806558][ T3977] device bond0 left promiscuous mode [ 57.811937][ T3977] device bond_slave_0 left promiscuous mode [ 57.817953][ T3977] device bond_slave_1 left promiscuous mode [ 57.824069][ T3977] bridge0: port 3(bond0) entered disabled state 20:00:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) poll(0x0, 0x0, 0x0) 20:00:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002300)={0x38, r1, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x38}}, 0x0) 20:00:18 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 20:00:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newqdisc={0x18c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x15c, 0x2, {{}, [@TCA_NETEM_DELAY_DIST={0x42, 0x2, "c60217d7c779313e0f36faaf83aa3ea25aefd82ee4452818308b33c65fb99b9bde221e32fc012b289b812850f69d016cc88c585ba64fe729067acd9bc9b9"}, @TCA_NETEM_CORR={0x10}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_DELAY_DIST={0x41, 0x2, "a37af558ca714780d0dfe97b6d0416f7b6c20a7d10ca71f1cd29c9407ff1cea8abfc670f2dbb3bebe52c091710f531c3c56d4b2d593181b39d384ee288"}, @TCA_NETEM_RATE={0x14}, @TCA_NETEM_LOSS={0x4}, @TCA_NETEM_CORRUPT={0x25}, @TCA_NETEM_LOSS={0x6c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GE={0x14}]}]}}}]}, 0x18c}}, 0x0) 20:00:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x48}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:00:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)='W', 0x1}], 0x1, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x10}}], 0x18}, 0x0) 20:00:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002440)={&(0x7f0000002300)={0x38, r1, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x38}}, 0x0) 20:00:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) poll(0x0, 0x0, 0x0) 20:00:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x48}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:00:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000004, 0x12, r1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) 20:00:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)='W', 0x1}], 0x1, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x10}}], 0x18}, 0x0) 20:00:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newqdisc={0x18c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x15c, 0x2, {{}, [@TCA_NETEM_DELAY_DIST={0x42, 0x2, "c60217d7c779313e0f36faaf83aa3ea25aefd82ee4452818308b33c65fb99b9bde221e32fc012b289b812850f69d016cc88c585ba64fe729067acd9bc9b9"}, @TCA_NETEM_CORR={0x10}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_CORRUPT={0xc}, @TCA_NETEM_DELAY_DIST={0x41, 0x2, "a37af558ca714780d0dfe97b6d0416f7b6c20a7d10ca71f1cd29c9407ff1cea8abfc670f2dbb3bebe52c091710f531c3c56d4b2d593181b39d384ee288"}, @TCA_NETEM_RATE={0x14}, @TCA_NETEM_LOSS={0x4}, @TCA_NETEM_CORRUPT={0x25}, @TCA_NETEM_LOSS={0x6c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GE={0x14}]}]}}}]}, 0x18c}}, 0x0) 20:00:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x48}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:00:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) poll(0x0, 0x0, 0x0) 20:00:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000004, 0x12, r1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) 20:00:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/227, 0x32, 0xe3, 0xfffffffd}, 0x20) 20:00:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x48}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:00:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)='W', 0x1}], 0x1, &(0x7f0000000480)=[@prinfo={0x18, 0x84, 0x5, {0x10}}], 0x18}, 0x0) 20:00:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) poll(0x0, 0x0, 0x0) 20:00:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/227, 0x32, 0xe3, 0xfffffffd}, 0x20) 20:00:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x48}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:00:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000004, 0x12, r1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) 20:00:18 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/227, 0x32, 0xe3, 0xfffffffd}, 0x20) 20:00:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() 20:00:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000004, 0x12, r1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) 20:00:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x48}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:00:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/227, 0x32, 0xe3, 0xfffffffd}, 0x20) 20:00:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() 20:00:18 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x35}, {0x6}]}, 0x10) writev(r0, &(0x7f0000007a40)=[{&(0x7f0000007840)='E', 0x1}], 0x1) 20:00:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@multicast, @random="472cdf62daed", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2b57c5", 0x14, 0x3c, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @local, {[], {{0x4e21, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:00:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8a142, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000140)={0x2449920400000000, 0x9}) 20:00:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() 20:00:18 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x35}, {0x6}]}, 0x10) writev(r0, &(0x7f0000007a40)=[{&(0x7f0000007840)='E', 0x1}], 0x1) 20:00:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8a142, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000140)={0x2449920400000000, 0x9}) 20:00:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() 20:00:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@multicast, @random="472cdf62daed", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2b57c5", 0x14, 0x3c, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @local, {[], {{0x4e21, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:00:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x35}, {0x6}]}, 0x10) writev(r0, &(0x7f0000007a40)=[{&(0x7f0000007840)='E', 0x1}], 0x1) 20:00:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8a142, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000140)={0x2449920400000000, 0x9}) 20:00:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@multicast, @random="472cdf62daed", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2b57c5", 0x14, 0x3c, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @local, {[], {{0x4e21, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:00:18 executing program 5: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x35}, {0x6}]}, 0x10) writev(r0, &(0x7f0000007a40)=[{&(0x7f0000007840)='E', 0x1}], 0x1) 20:00:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8a142, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000140)={0x2449920400000000, 0x9}) 20:00:18 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:18 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:19 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:19 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@multicast, @random="472cdf62daed", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2b57c5", 0x14, 0x3c, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @local, {[], {{0x4e21, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:00:19 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:19 executing program 5: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:19 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:19 executing program 5: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:19 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unlink(&(0x7f0000000140)='./file0\x00') 20:00:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unlink(&(0x7f0000000140)='./file0\x00') 20:00:19 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unlink(&(0x7f0000000140)='./file0\x00') 20:00:19 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:19 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unlink(&(0x7f0000000140)='./file0\x00') 20:00:19 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:19 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, 0x0}, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 20:00:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unlink(&(0x7f0000000140)='./file0\x00') 20:00:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unlink(&(0x7f0000000140)='./file0\x00') 20:00:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unlink(&(0x7f0000000140)='./file0\x00') 20:00:19 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:00:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unlink(&(0x7f0000000140)='./file0\x00') [ 59.196622][ T4136] ==================================================================