b50a6f31ae33dba0c9f5a2a9cc97815dd8044ea50d7747286a70245da925445e0e6c794edf1e3b09f906f21d0ac5cc7d1f6b4ea96c3d920d723f4c56f2a39c94", 0xb4}], 0x2, &(0x7f0000000bc0)=[@mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x200}}, @timestamping={{0x14, 0x1, 0x25, 0x1000000000000}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}], 0x60}}, {{&(0x7f0000000c40)=@vsock={0x28, 0x0, 0x2710, @reserved}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000cc0)="f4144b766f64e3eb9c7a6f1ebc775bb00a18a3787f9eca822942e17edee57382a493acec12f07768a0b3e490375b23864f199615a4cf8994aae3be9a1d", 0x3d}, {&(0x7f0000000d00)="116b517c9a4be334c8decb10f6f7e39d875ee35ddb6a0d864c2a65b014c984bac4d601fc7a1231c31e6e88762e66ffef03edf13cabf18faab10411e8dc4ffc92ec36c451b1d15317107c4ddb3ec88d6b841b79aa553604f27199744f66671c7117106d23eda26c6481cc4ca5ddd5dc97a67ae62c909abe87ad7cf8e8821c385a55e7dfbc7c198f8b14fa9fb5ae316b920b295904b309e6dbe3610ba9ba25bdb1382363f8852d00c943354a02ce1dbefe46e81c5e808c9a3546fe1d516fda88f29983e715ea93e5078587a992", 0xcc}, {&(0x7f0000000e00)="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", 0xff}, {&(0x7f0000000f00)="43a92c73f9005f5564a5e59bd798f22f9c0b95603d879e6ce5a0ca04288b0aabb50486c1a79488b77533c6c6cbb8fac2c85da29a91956dcc7dc943f1e99bab21b821dc68bcc2e0511f0279ca90b0d4c6", 0x50}, {&(0x7f0000000f80)="6be4787ae6cf2e012ea332c2ec3172bce0e33411f7f435eb4442d20e1e3d1b962994ce6a219e8c52c5e7e1248d3a9f70e34ee0e4588a7f83e2d900eb70f1910b4f54e3a57f1041ef865f4f1bab5dc799080df7ceb1985717c595aff3c60930ec52eed2ca1c5a125f70c9f9ea3d546f4f5412c0f8a6e010863f436b5d85ce613f796ce231f6d3430366b00bc279494efded55198c1d6fc2ca0008bad26a1be696fa4b9fb93c479746fb7e2fb9db8f3f0f", 0xb0}, {&(0x7f0000001040)="3f65d33cf980b235a09430ff254502841459f5195416076aa41b88a1be9f46196b00778e5aefc2d9c42d0ead8ab4c270d8be017701e385caffe2de26de2f35c7dc6ce9cf381d7adc352e08cd0b704dc34768fbb2e00ccaa1421a8f5c43cdbba6f1dd1ec6e44decf8f424d65ed10a27dd4a7eea931627b74038733d5de609af645ef89a131477a8846ca318f4c76332c2e6e8cee530f6c18b2f9ab1f892982dc143b4c4c789713e33dc14e89fe04befc10a84bef726672f2040224a424d521c5c8cc637c4d6ba463c9e740967349b8e878ddd0c1721ba19480a71f5d2d2ef550c28", 0xe1}, {&(0x7f0000001140)="bfb4fbfe852c38e74e6d6edc4d33216bd3be2ef7c106dc5ba3a5a6f970556e52614fe2ce91ec80f1c2267f1cb0670fc383d1f1003eb023d818f0667b0a7d1e933df454653a49c33ef2e5b9ca14de641079a3ab1c8787d7678bc6ec326bca26271a99", 0x62}, {&(0x7f00000011c0)="12627be238c11ea231e34d491368272d79d835400570ac19ac0ee14eb8a4bcd0df2525bc80555a12d67ee8cb0cd8f6a3a9285d1f789fb095bfb2b05ae2e0b10200d0e0f7789e1d30dcc1dd05fe1354a524c5f45d8426121406ea48afc0a69552a9bf62637611a8a813e2c6f62da301200e87a4", 0x73}, {&(0x7f0000001240)="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", 0x1000}], 0x9, &(0x7f0000002300)=[@mark={{0x14, 0x1, 0x24, 0xfffffffffffffffa}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xda9}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x60}}, {{&(0x7f0000002380)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x0, 0x0, 0x1}}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000002400)="12a47214b58b0096ebb5f652b7c739cc5cbbe88045c60807a89eeb118f0fc89d3264e1af7fa4ab3b25b79c4122caebb25a0f1c8cba88d481c55c2b4e39c81753f44706e5ffd23b5ed2f9", 0x4a}, {&(0x7f0000002480)="cd5d83f37e6ad714e05c8674e25a8f5a6a1dedbb098622ee38df574f529f1eb8b3d53dc8e8bb7292ac9fb19b922983165400d8c4e6dbaee69807ab6e09a8914782494f4119eb968647e8ecce37197a77992f8c9e6d97d4aa1113100be3307f2737d2388c92cc9247aa2e3e8e151f4b485b1721ac3c54ccf84f954177abe62f704123008ee3e7c04141172742b118e7c09d0bf74723f688de90a6031aec072686d4ffed87885e65b0d9d300b79350dad409a9350a9cba84712d1ffa94905c66f8d398ce2a9777d1ba6e897870810a622ec942265322e1ed5506428c850e27c314df7a9f144cf043f0c7749028c47653249a", 0xf1}, {&(0x7f0000002580)="ebe685c8da87844871", 0x9}, {&(0x7f00000050c0)="6166baa2a503a160cf339b072861baac73de295663fcdd4d661f519450e107aee92d6b1ca9ec0450b0ec75d273796dab82511bd2d7d2d8bfae7101f4b821a6b17383c053f67d2749898be3cbc280cf637d57edacc0c82d782369a63f2c075178b05716dd5cd7f950084b106e0500000068095cb6247de97d5d4daa18fc4e02bfd3007c459abf92bcf94f2cb11c6e5858646e44b23f4705a3ae44cf15c75058adab3e6b17f3f4ea99e40b48a46c18c1d1e979c69b7dfab72103fbffa913e4", 0xbe}, {&(0x7f0000002680)="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", 0x1000}, {&(0x7f0000003680)="274d7b38226a1592d0bff0f634d7f7864352205d58558c05146395daae8262560cc8d7b78eb4d64a156605e4de5a13bc71a0014412d459a20b88afac7e6dba235581d6ab90508da5a3aefe4509176e3c5134e13849d8b0", 0x57}, {&(0x7f0000003700)="a4200f3a17b94c05ee747738ce7aa7ab0c8609450624e9a4289e10721884b9cd945c3f0cd66dc75599f84a7f4d4e2bc884ebb25fcf840902dedb769262ac93a42348c3a17df56881afb1fdb9d877dd426935c551b836b65894cad1b590498b4d7ac63251d2f0fc125720bc51ad6de3bc424f68c66634c421df3a020b1ae6cff1ee943d1ad0202922cabb44c425c9808c664279edd8a31ea72ee9039d6d5ee69a3979950de08be12e605d82a9d996f7b17208ac027a6a1dca", 0xb8}], 0x7, &(0x7f0000003840)=[@mark={{0x14, 0x1, 0x24, 0x1ff}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x48}}, {{&(0x7f00000038c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x2}, 0x2}}, 0x80, &(0x7f0000004d00)=[{&(0x7f0000003940)}, {&(0x7f0000003980)="e362ab06d6a52ab7d38f84b21f6591c89764c328aaf1051918371f56c4384cd0f69535351fa29bf3af04aa22bb0796061a5dacb10750fc6d6c0827d4c299f3874dc616cb38d75a1e1afc0887c10ff98ab4daae72b3ff9277ad9b0c891abb0150057875c38d6e620c26548148b2350981a5764b414e3ebb32b8d9882689dc147967decc11f8187007f19eefffcbbeea50888cb453be22f9ec938974be9bbefe45019c74feeda7caf4ed3d305e58196f108b22afad6ceef630bcb5d0f8dd6dfb65aeda", 0xc2}, {&(0x7f0000003a80)="84f30b9e92983e7526e44304a1da6f58858ca39e728af244c917dacbd39b36caeb91999f992b361f8dae8f7c87e578e8acaade983a923c3d264fcff25e41617c67e2428a63f998587984b7d7c14fa55dfdf2a5f0f5f99a45f02582bfcb3bbbafed442576708cac5cd99ce1aba417988c2b6a73aa3db9816cd16d9ceaf8b8", 0x7e}, {&(0x7f0000003b00)="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", 0x1000}, {&(0x7f0000004b00)="3b6dd01fb611d5353e352db7ab89140a72386d66c3836393f1f4d0e7f0f990d644539b9ec1d0205bce71404ae01abe638285207cc0d2e425c411b01ceb98639fd1523dda59b35264372f9e056130f31b8bdaba012a0ccea9ba0a712c3b79ef80e0ec78791da10e8e9ed58b3637b6cfa0019437d16c29d6b181fdf3d503f85249a0ce2abdea1b16e9c63d0cce06800886d53526e76947c9d101", 0x99}, {&(0x7f0000004bc0)="2548819cd00399283df9feb244354418df1a67e0c5c96e3dbfef6b37c4a0bd15a36aace14aaecb37a1f579402fb3760f8d89056fd6633ef818ea52019ee3f864b88662a64ac83e7b360656632bea671134376c4260f9c70bab1829bf76341d497eb2a142dc806d25b75362324ca800d4b997de08d1b6", 0x76}, {&(0x7f0000004c40)="48417288a8a6931abb24826e1d2ff52b39a5e607440b8565a54f95f0d26bab915f761ce1c951247d2be5c3cffa", 0x2d}, {&(0x7f0000004c80)="2ef3d2554cb0f401b1586e47294ead10653ae96f13f18fa3e57f048e12b8d529bf2cb6a75e0f334a7b670ee4a44c783584982c9baedc65216c871a6d310bdee32ac8e4aba4998afba4b86e1725b4375e", 0x50}], 0x8, &(0x7f0000004d80)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffffffffffffe}}], 0x18}}], 0x7, 0x80011) r12 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r13 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r12, r13, 0x0, 0x7ffff000) ioctl$EVIOCGREP(r13, 0x80084503, &(0x7f0000004f80)=""/221) r14 = socket$rxrpc(0x21, 0x2, 0xa) r15 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r15, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r16 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r17 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r17, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r18 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r17, r18, 0x0, 0x7ffff000) sendfile(r14, r17, 0x0, 0x81) bind$rxrpc(r16, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e23, 0xffffffffffffff7f, @loopback, 0x1}}, 0x3fa) listen(r14, 0x0) listen(r14, 0x1a0) 14:03:27 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) listen(r1, 0x0) listen(r0, 0x5) 14:03:27 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x3ca427a7}, 0x8) listen(r0, 0x1a0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$PPPIOCGUNIT(r3, 0x80047456, &(0x7f0000000040)) 14:03:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) prctl$PR_GET_TSC(0x19, &(0x7f00000001c0)) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x501000, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r3, 0x0, 0x7ffff000) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() ptrace$cont(0x9, r0, 0x0, 0x100000000000000) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) ioctl$DRM_IOCTL_GET_MAP(r6, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffb000/0x3000)=nil, 0x800, 0x2, 0x20, &(0x7f0000ffb000/0x2000)=nil, 0x1}) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r9 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r9, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r9, r10, 0x0, 0x7ffff000) sendfile(r7, r9, 0x0, 0x1) write$P9_RLCREATE(r8, &(0x7f0000000080)={0x18, 0xf, 0x2, {{0x6, 0x4, 0x6}, 0x5}}, 0x18) 14:03:27 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) listen(0xffffffffffffffff, 0xfffffffffffffffd) listen(r0, 0x1a0) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0xfffffffffffffe9b, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @local}, 0xffffffffffffff29) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) r7 = socket(0x11, 0x3, 0xfffffffffffffc01) recvfrom$unix(r7, &(0x7f0000000240), 0x0, 0x40012003, 0x0, 0x713) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1}, &(0x7f0000000340)=0xc) setsockopt$inet6_mreq(r8, 0x29, 0x14, &(0x7f00000001c0)={@loopback, r9}, 0x14) r10 = getuid() setsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x3, 0x4e23, 0xc451, 0xa, 0x20, 0x180, 0x62, r9, r10}, {0x8000, 0x7ff, 0x2, 0x7, 0x6, 0x6d1, 0xbaf, 0x1}, {0x1e, 0x600000, 0x8, 0x8}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xb3}, 0x2, @in6=@rand_addr="2c57e23611402291a5cc7f6862cfa12c", 0x34ff, 0x2, 0x1, 0x80000001, 0x8, 0x8, 0x6}}, 0xe8) 14:03:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r3, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) tkill(r3, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000006800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4200, r4, 0xfffffffffffffffc, 0x1a) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r8, 0x0, 0x7ffff000) fcntl$getownex(r8, 0x10, &(0x7f0000000180)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r9, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r9, r10, 0x0, 0x7ffff000) ioctl$TIOCGSID(r6, 0x5429, &(0x7f00000001c0)=0x0) write$cgroup_pid(r10, &(0x7f0000000200)=r11, 0x12) 14:03:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:30 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000040)={r1, 0x6}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$VIDIOC_G_DV_TIMINGS(r4, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0x100, 0x8, 0x1, 0x0, 0x8, 0x56, 0x7f, 0xfffffffffffffffc, 0x100000001, 0x1, 0x1, 0x7ff, 0x1, 0x100000000, 0x10, 0x1}}) listen(r0, 0x19c) 14:03:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7e000000) 14:03:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) gettid() ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x2, 0x1000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)='&-\xd3cgroup^cgroup\x00', 0xffffffffffffffff}, 0x30) ptrace$cont(0x7, r1, 0x101, 0x3) 14:03:30 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) listen(r0, 0x1a0) 14:03:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:30 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x208000) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000080)={0x7fff}) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r1, 0x0) listen(r1, 0x1a0) 14:03:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xa0010000) 14:03:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000bfdfdc)={0x14, 0x4, 0x10000008, 0x800000001}, 0x14}}, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) getpeername$inet6(r3, &(0x7f0000000040), &(0x7f0000000080)=0x1c) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r1, 0x0) listen(r1, 0x1a0) 14:03:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0xc2) 14:03:33 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) shutdown(r0, 0x0) listen(r0, 0x0) listen(r0, 0x1a0) 14:03:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x269, 0x400c000, &(0x7f0000000300)={0x2, 0x4e24, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="070009000000929cb7d94060c500", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x76, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000040)={r6, 0x9}, 0x8) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffffffffffcbd}, {0x0, 0xfffffffffffffe8c}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0x92}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r8, 0x0, 0x7ffff000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r8, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x47, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000240)={0x3, 0x3, 0x401}, &(0x7f0000000280)=0xcc, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x3}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r9, 0x4) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0xc2) 14:03:33 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) 14:03:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setregs(0xf, r3, 0x0, &(0x7f0000000100)="0c49c71eeb68c0991b08dcdb44b4551aaace72d343e1c5d7172f8fed6b1db991a69ce976e2bcd0a279020b93cc82b4e8b6a241cf2428635b1faebe56d369fe4acdabfd3fef6cafd58305bb882cf846eff5e400ddc91e978b96ca322252012f15a13fb8fc52707f028420deeccd0b9d2c38e952a800da64975018d318b50362450824210009e28c1cb847776cbf9720185761f67f227246") r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) pwrite64(r9, &(0x7f0000001540)="8b22a458f258e58f14a9c78317ea64c7bb04c635c5b5544cec09f74859dcb625c839fc9a9d03d80820ddb481ac26e602281abab42b1c040e37f08be7a4936dde98765359ffc2745139606ddbf469532270e7545ce346ce085ec009fb71fc5939455285a2ad087ee35f4bc7db24df53b1981d63a3e4f182f8e273900b8288f0332709e897f44e56d8df51cd009772a20541ad77bdccc27fd557d83b09822b8c6e99db0b6ede226756a7859ac59bd0b0edb0332bb277189d2bf75124e9816f3c5730a12510d4e480f87440d850865b8efc9c0689d5cf97fbade52b4d0ff3a795a8d0c20cd2a3f41e2ebd7ecce8df958f581a3575fb14317cb48158aed4500ff695270e0846155f6b414675ac820a3a2ce96db7a8554e276b80398dba889f8cc7cb1117060388d1f7cec38354b1a21d30239a00520b549f1f33420444b6216558c49b42737708119e30c0922374f159eadfe18b829599f85b9c190a3c2917e53f4d30311436a62244ccb53f10408fc1c8821667011e82dc802e116a9b2a49aa6e103419453b39bec1e1be7d94440c41d844795691540c53a99985f949e090dfd2abd218a589a51ad3b10c56cf4cf8473add47badf1685d5b7c0dce48a00c1b3c953bb6dee70aabecc863ded9e7cb1d9e5ce3e65d09420ea9ccbe4f025e127472e3fff80d52fe3294e268389468fba53f62f83594d73784f65bedcccfc2f74ba707efc3bea8e9c5025db797b544c5f826531d6b4691f171e07b1c7bfe852d4e84096f199e37ea73465d11adb5a7aee8cf14b0264893caf45fe5e88b27c0fe15d5efa76895f30103fe58f1b3be64f99a4bce898078c48f57f35a59ab1985e12982e750286e475ed7e877045e18d54147cadfb51f767daebfb6f30d6ad88691d46e791bc13029e215ae4a00cc5eb485030ac962aefcd71573dccf9d14a6438d7791f71baccb0911780a5e2f9f3d53d49e3024393267589cf742332721652414951807f30cd5c8d1f04b9160ca4c0aedf146462701f10d3612db6aef9cdf92004a20d0dd726fdc4e377c27c1cb1f1bc54ca4d70ed773ea2f162ffa5ffbe92c9bb47c1900b8ec72b95dfa50d43769197ff24a820b128ee62a6397b1d2c9d65d6bb9cd996d2fbc43e0398177cf2a00f6fae63e4dc9c7a6fb216a3e24bfd68ea4d228435c20e0e362c31cd74bcdd549b5ca570b6782fec8574618cf366e8ca10375e903ae4f7a04da1a761c17b1b4734a3983f819b2cabdb329d58ffc1fdff692de0db48be1358fbefabe3ca32b32a5f2a874d6981910f1e563e408d27a5517b0dada9f448d99e67d582f66e8c8bf4be5692c15901fd3d614989721cbfed361ced2289313274a75c1cab1341d8728257e20311d497e731ebde699f33ca81a8ce09594e25997cb65b4991230e742b8d110562dde78664697b09188c1048766691829c267520899300e3bdc5130bfccf0a8b11f524094aeaa54d014da082f1cd77524bc978648d9f98982073c0b80acb1917b0a16a17fba390e528a064fb6d178136b7dca2e45d72a952db64c965d444f7a5a019b4b81c5b81ae7b968b5188d984101615eeb2b41a7b21c587676ce23c1770b9c4c1109861c065c0af13893a039a098bd8d572350f298367022a199c577958bad2274a239c94aa35a94152e530394088e648e00bf13f2e9523cfa9628ca015b16a928d4f66e65d55b79b093e2452d1eec0365c88e1b24fc811e261a07b8a316acf84832adb8248181a431786faec7429eaa290aae9d00d384d403f8f6df01f3a05e54f894a27b2875e1ce0be90c5e87e814fa25214fa9289bd6f0a3c4ba3db659e690947fe1cd058e0f785214f1053dc917454d6a777c452ba63ac26b17c5666b02be8839e73fac6d622b98603eb1eb9bdae423ef867735ceb1c80ad5ed4d500044d905b9b159ab4da09c924670db2ec62a9bf46e487168e21a3cfc81a718335bf35a0dba27c215b41a494094712d30c935a940c5da0c3fdd72b05294a73486c70b572eca5c13f26494e278287a49cdcf09535595ac8c577aa661fa7818cdeb13f5f78cd9066a1bb898ab77373c3ffa6eb4e8a2e9c088dbe1733b75072c7eb106f5c6307641450a8c7d2df6009a86b0cb28e97db25cb2d2be24df741e52574c2936c349fc9400e4ec675e6900b7a9ec92f4ebeedf020aaa9f5eaa7d57de657a9d8834cdfb45e8305a67d5c415939c66497d1deb1a41bc8e399b9690879321365b0295c85c286e1648584e555f5bbd5a58b4aa79edee8041dd54b4e4697084dfca14312abb90180006d3492e63ee070fc7625d6235c7fd25fc8e606982ff21ea8106bf4aaeb3188632ea3959c3f6cbc4dad23c340743b9c951bf9af5f235ec27476aa55379d42c86361d3991caa812a250f5413e596f79da3f0af226b792c45b591a8b191da09445c03fbeef82c91a3f49ff1149248b22b2923f56df48be37dc367fce7ebee02c83cd1a06dbaea7c52c3e6e2917230e77c53d3e16e37da61633d33fdb13370cf00d76d3533277b25ae5a0a747725dff8d6321e6fd87231212c085cbd9d24d44e756244fe29cb284ed418df340b2e92032694e8071dd7cb8aa396e91afbba33ec34e327b03f64f5ed5bfe0840d34656cfbf2fa4c514524515f5db8adbd3f1c6916f623ab509de0c7f87cf4b439627a64c8b3e6f7870de8a1a460e66806cd5402cd7b2574d0856a882cfb01c65419b22b08442c7dbca461996d36d7896a662b36e0273b7d580b24b42187f23b8e94e9f109fb480e280f7f080822f729fb0affa30ac78adb9d38a792c18a85e51ef9519f1976500d2c30869b0c7622a40cdb60f6a0e6ccdb8ffb4065eef101dfb09448cb2ffa068d7cab72e32e8c37858cf3734700dc6a1fb63f5dc763e53d369560bfc3547aa3d8cddb4b45ad6edba8241088c81b35fbcd6e34b3630c71856e6eb392d610c8d95fc4f9c93135e4474423b6f42e2aced66c86826803796552480f62085601817311ef224896aafef6a3ce09c86651d85a48a5620cde3df252949c9c412703a654de28a86c464295f5298224a852a5131bbcbb9c917507edde0443111f0080f716cc0568188bce87fd979eb0421031409c7ad30c001ef3b5fb72035854bb88cd7be051c17bb993fb9c23664a2501f100ce813c9bfd8617df85448c30c2fcc90745eb452027d98d4291452fbdbc7a155c608956f037526fd7485ee8041f2acff2a667c182313c9d265bb7333a6865516617401f475385858f8178c3e652ed213fe75c467dd22212ccffc84fb311440924aa62c840946574e76dfce1589bbb8aad75529ca6f2eb3f32f153dd2da3bf59ede2d02b63918e6d6442606b56c57be357fcfd5ff4388e374ca53d6b466f08537854c64466e4a38c5ba63e162c0945d973bf57dfd8741faeb3be2c66e9d1287d27f6377aeb2d5987c08945ec7b54eabbf3939d8a38553bbe668f8dbfe64fd25ec3722ab254c6ee4baf0c0adbf41d3e132b8cfdc0076d6f7cac63b8a12fb17bb1bc78dc8e3289643698bfc595d0aeedb5e7f8558f153d91f70e379c11d0438077fe8c2660afb854c48f18e56ee1e8b4be41da2d3dc88994893750b2c5034b0f520b6ffe62f63652c48f61ea4c2d2b625099643f5f9e5f5ba87ca98c73b3896da4ac1b7494ee0093aca8a20eb1a1422aca5921d6935eeb90dba79b6ac8524f3c925788f54ded1cd1ec4112b1f815e8c3b9606b5f7bae56c01a94f9df63deadc6484d67a32cbdbbac7374734a9e2b19c383075122a19fac920257f3ca4eaee4248bc5411d9c833b708134221ce009bff1f15677bb21341c533dcf04bcfce0997fb992602a1ff24bcea110be9eefc84c5153c1d5615d0aeb61ed4242ca14a46a6f166d74325fccd5ab51df410044e246b522068a9184fa78dc0a3bc231fa3e235400d194b3f2109a458fd5028aad20e0c4878eba918e793b76ecc226a795a10229f55accad293dd78d5a84a9640b29bec3dccdebc1bfeebfda4e60b2c834712f2c732f2a90db4d24672b3dc135cd46a05274ea8760a4bcc78de64dedd1cc7e2b67872ae288c6caa14b782406737ee78d1f3f38cf5a777f29aa0837f855ec508b3a39c0a08a96cf33dc4f9c1dbdb5b6bbcf063fa9ae210edfde69633cc2fdaf6f22e82d6a1973460521897044d512ea5a7ec1f117ddc48f7e6ab372880f3a83c919dfd426a32ec2c289c7703f7013b25c8cd7a68fb01e4880731b464e19e54ed09fc9b89819c831ae67bd837068f61dfa33e2d5c5440ac3dc846f0ffbb7fa261ac3ed284e058cb244009c8371aead4f28ef47946f2efc475c48bc0f52c270ed033f87f9b97ce645678715e8cd02aba2df155582488cb4969d5429ce3d4a83bca5707045aa79f44952f662fe364898d35ee5047b74a9b608ef1b6562c9e30600c72850f110e8005d119c1d0f234cc3b522e9a951482041506f3a72c8d6cb86c9e6df1a9f273250bdd1ee296a22447307c2dbd39e0ff018e62aec58f92891714f14607b11b43e9c21a27c771b71fe744fda397c19f40d685ee6e0c914eb1d376226ecc64af665cad1515aabd62470152357828a3b33a2518592dd1eb15f934eb18894da4f59bc6dd9e4f3f79e90dc34ff0253a71aeb39b974c3b0cfa15dcf17ea3285f923f351d736446db8812cdbc1ba180c1a54e37f49990571dfa1407e8f46ced271a7ce8f213815fd596a9e429abd3e67016d6b0687c1b744c968b2d1a70611e582c9c498498a31ff237ace823cda71d7770ae72f647d155d2225303086cc375fb6a92f66ca505e7ee077ed7703f6c55ea70b829f514bc3fe5e43b6c8edc5df2834760e716e28ddb9bf1c3ce1f5358db3ad0650d7110098205eec2256b5a23445fafe3edb4d3d5d562a2a2ee5d82191895af27258fb63bf88ba64ed4e6c9fa751546e92cad809aa5f04cf8859f4b481562585a57de4e47b6992a43c10d0a05d81433ab5da718561d2792c7f055a0a808ed483fd7abb3da85e6724518e7ba411fa8111345e8fbe964d21148670a9625904771101b7e155a107e04080576f8ad3e7d0410812320c12dcf21f116430dbd3a688f157dcd7b1bb2143a78483917b5d081f99773348363964d839d1a8ff9139f4bb481ddf6c161e90ff2f32c8a8479e5effc50063d1a88db1e093d3ed8fafab7ef425d81bbe16a90a8e433a5e6407365d48508868e4b8c2e9d72b46527bbcdb24ba8cf2b3180b8d0787fc66b09eaab60e094770552063f6fb2e8524cb3a148738b17fa7f4e43c48c2b8f40d34e6af49e28a6bda82a60cffdc97eda1b0f39f7950b2ac9ee41b37442d27eb9b0f23db83abe54cb7f62bb6d2a4c3b4f8af18a37c212f533adec0ac61cadb91bdf0547e6afb9088b299ac5dba2f69d922c5de55ed9e14851e9cbd669f6f620c21bdd2c05f1f5f7d86cc8942a05cee14c0a58ab71d5e1313f35997d4e9319e51b26015b970bde5d2bdc5b6cca5a2bfd473c972a3cef422fad320a80be6f91625f8e99332173328aea9f505b083c7221bfaf472b043b8b3e3344a0ce72a6d53311263344e721d16b2b4f943c41402752c85d50ba26e37bab367003aac0d8c5299fcfd588da25dfe7f253c4d49faa072567ea39b00722d18e066e4d235b129205ec5bb8761644de1d0e6624532ab393aa66b112bbbfdf0fe0d0b3bce79fb5e204ea68f76c2b7bdc6b12dfd0ce8f1034954cd9044b19f30a24623d906b3d72180f61bae414ce9772f5e2e780c1df29be50a778611e5f7c5ee12d1adfd6be6748457278f6575a7420ca74ff6a657b5a42eea6626726f5816d4dedbce7645b3f623d460fbed63972171ff11013f3b4c51be7c0525e768b07597032b6e1663286272d3e388e81b8424ae73f8e5fc20514863f12f6bd5955a0318331e560de8a1a6e9676eaca483c41b777858df4e8e8ba0d98c1", 0x105d, 0x0) tkill(r8, 0x38) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = getpid() ioctl$sock_SIOCGPGRP(r10, 0x8904, &(0x7f0000000280)=0x0) setpgid(r11, r12) r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = getpid() ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000280)=0x0) setpgid(r15, r16) perf_event_open(0x0, r15, 0x4, r14, 0x102) r17 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) perf_event_open(0x0, r15, 0x3, r17, 0x102) r18 = gettid() tgkill(r11, r18, 0x4) ptrace$cont(0x9, r8, 0x0, 0x0) [ 1803.305936][ T5916] ptrace attach of "/root/syz-executor.0"[5897] was attempted by "/root/syz-executor.0"[5916] 14:03:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2802) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000540)=""/4096) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x92ca1bcd717316a9, 0x70, 0x211, 0x7, 0x8, 0x3, 0x0, 0x80000001, 0x40000, 0x3, 0xb, 0x7ff, 0x1f, 0x16b7097c, 0x1, 0x7, 0x0, 0xff, 0x9, 0x1, 0x7, 0x10001, 0x3, 0x4, 0x2, 0x8, 0x1ff, 0x3, 0x89f, 0xffffffffffffff94, 0xfff, 0x2, 0x5, 0x81, 0x8000, 0x8, 0x400, 0x9, 0x0, 0x5, 0x0, @perf_config_ext={0x3f, 0x20}, 0x659197b9d568c295, 0x80000001, 0x8, 0x2, 0x3, 0x1, 0xc90e}, r0, 0xd, 0xffffffffffffffff, 0xa6dd84a988f9d041) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xfeffffff) 14:03:36 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) rt_sigreturn() 14:03:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0xc2) 14:03:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x80) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'ipddp0\x00', {0x2, 0x4e22, @multicast1}}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$SIOCX25SCALLUSERDATA(r3, 0x89e5, &(0x7f0000000000)={0x68, "974762c54b7b3ed2498386a07539de22ee3aab256de6ae302d72118977e05471e363bc43ba85447cb57fe2a385350f3705ab2846a1a2b9126cae597b0bf65d8803ca31fd698aaff271fbe9eece6925acb76145fce0ab800baa8f294dc2cbdbf2bac7e9304449ab49ff57c856f4568680bc199b787248d953537f3f1065ff02a9"}) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000040)=0x100000000) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r2, 0x0) listen(r2, 0x1a0) 14:03:36 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000000)={0x6, 0x9}) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) getsockopt$SO_TIMESTAMP(r6, 0x1, 0x3f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:36 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:36 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x36014f7d7125d55b) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$RTC_WIE_ON(r4, 0x700f) sendfile(r1, r2, 0x0, 0x7ffff000) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x800) listen(0xffffffffffffffff, 0x3800000000) listen(r0, 0x1a0) 14:03:39 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xfffffffe) 14:03:39 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x7ffff000) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000040)={'bpq0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) connect$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0xffff, 0x8, 0x4bc3, 0xf503, 0x9a, 0x6}, 0x2}, 0xa) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0xffffff71) listen(r0, 0x0) listen(r0, 0x1a0) 14:03:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x1a0ffffffff) 14:03:39 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {{}, 0x0, 0xb, 0x0, {0x97, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x211001}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x6, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x50010}, 0x10000) 14:03:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$getregs(0xffffffffffffffff, r0, 0xfffffffffffff001, &(0x7f0000000100)=""/209) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) r5 = getpgrp(0xffffffffffffffff) setpgid(r5, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = getpid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000280)=0x0) setpgid(r7, r8) ptrace$cont(0x1f, r0, 0x1f, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x100000000000000) 14:03:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:42 executing program 3: setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) 14:03:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) perf_event_open(0x0, r2, 0x4, r1, 0x102) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = getpid() ioctl$sock_SIOCGPGRP(r10, 0x8904, &(0x7f0000000280)=0x0) setpgid(r12, r13) perf_event_open(0x0, r12, 0x4, r11, 0x102) getpgid(r12) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r14) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r15 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r16 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r16, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r17 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r16, r17, 0x0, 0x7ffff000) getsockopt$bt_BT_RCVMTU(r17, 0x112, 0xd, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x2) ptrace$setopts(0x4206, r15, 0x0, 0x0) tkill(r15, 0x38) r18 = socket$inet_tcp(0x2, 0x1, 0x0) r19 = getpid() ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000280)=0x0) setpgid(r19, r20) ptrace$cont(0x18, r20, 0x0, 0x0) ptrace$setregs(0xd, r15, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r15, 0x0, 0x0) 14:03:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1811.752937][ T6447] ptrace attach of "/root/syz-executor.0"[6433] was attempted by "/root/syz-executor.0"[6447] 14:03:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) ptrace$setopts(0x4200, r5, 0x10001, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:42 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x12b) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$KVM_S390_VCPU_FAULT(r4, 0x4008ae52, &(0x7f0000000080)=0x200) sendfile(r1, r2, 0x0, 0x7ffff000) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r8, 0x0, 0x7ffff000) r9 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r9, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r9, r10, 0x0, 0x7ffff000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r10, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) listen(r8, 0xc) 14:03:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:03:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4000000000000000) 14:03:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:03:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) wait4(r2, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:03:45 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='net/udp\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) bind$rxrpc(r4, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0xffffffff, @rand_addr="773a32b7a133573a5be565a17a5d0026", 0x3a6}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) [ 1814.813045][ T6686] cgroup: fork rejected by pids controller in /syz4 14:03:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @empty}}, 0x24) listen(r2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) getsockopt$sock_int(r3, 0x1, 0x28, &(0x7f00000000c0), &(0x7f0000000100)=0x4) listen(r2, 0x1a0) 14:03:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x7e00000000000000) 14:03:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:48 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200100, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x10001, 0x0, 0x2, 0x8}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000000c0)={0x8, r2}) 14:03:48 executing program 4: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000000100)={0x200, 0xe6, 0x2, 0x3f2, 0x75, 0x4}) 14:03:48 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) r5 = dup3(r1, r4, 0x80000) bind$rxrpc(r5, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r6, r7, 0x0, 0x7ffff000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x800, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r8, 0x3) listen(r0, 0x1a0) 14:03:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2d78da0d6591ab38, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:48 executing program 4: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:48 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6(0xa, 0x3, 0x2) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r2 = dup(r1) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) futex(&(0x7f0000000080)=0x1, 0x8b, 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100), 0x1) listen(r0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) listen(r0, 0x1a0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)=0xff) 14:03:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x8000000000000000) 14:03:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0xff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:51 executing program 4: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:51 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = fcntl$getown(r2, 0x9) getpgrp(r3) listen(r0, 0x0) listen(r0, 0x1a0) 14:03:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r2, 0x0) listen(r2, 0x1a0) 14:03:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0b") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:51 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x98) sendfile(r1, r2, 0x0, 0x7ffff000) fsmount(r2, 0x1, 0xe2) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) sendfile(r7, 0xffffffffffffffff, 0x0, 0x7ffff000) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r8, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r8, r9, 0x0, 0x7ffff000) listen(r8, 0x1000000000082) r10 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r10, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r11 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r10, r11, 0x0, 0x7ffff000) ioctl$VIDIOC_ENUMINPUT(r11, 0xc050561a, &(0x7f0000000080)={0x4, "3e71eeb240b7709c53922c5a8a78d6895edc97a6c5a7dd1df7f66f50b5313d39", 0x1, 0x9, 0x2, 0x92bf90442989a6d4, 0x8, 0x8}) listen(r0, 0x1a0) 14:03:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xfeffffff00000000) 14:03:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0b") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) sendto$inet(r3, 0x0, 0xfffffffffffffe34, 0x400c040, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0xfffffffffffffdc5) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r5, 0x0, 0x7ffff000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r5, 0x800442d4, &(0x7f0000000040)=0x9) r6 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r6, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r6, 0x0) listen(r6, 0x1a0) 14:03:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) timer_create(0x7, &(0x7f0000000040)={0x0, 0x10, 0x1, @thr={&(0x7f0000000000)="ae5273b4e16a918bedf0714007978457b4e5560aad87dda112ef0968398ce5a15df0d1752e", &(0x7f0000000100)="71ec87bd2ed96fa73b94d8397ff26dd599bdf4e52f4aee9771385218f83df337b0845262b2d2b8808df3a34cd0f37356e4a4825a8c41bf207dfca28ff5a97f23c08ebb69e48df32d9795d6cc375b627d2f0dc610b3078ff6630b353369ef69c15b53dd39295c75d91a66bca7681d3c01f6dc16a5f8cffebfbd71d7f93e2e5fdae14c9cef50d8ee004e1cb555b4da104ad5b0057c0237d745e184f4edcaee31fb5f72bbde7f7f980ded4bf3e5d31fcb444e573100a6940a215ac3308198bb2f655cfac0a4"}}, &(0x7f0000000080)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0b") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:54 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) accept$alg(r6, 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r8, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r8, r9, 0x0, 0x7ffff000) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000000c0)={r9}) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r10, 0x0, 0x7ffff000) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r11 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r11, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r11, r12, 0x0, 0x7ffff000) r13 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r13, 0x6611) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) 14:03:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47b") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:55 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47b") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xffffffff00000000) 14:03:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47b") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:57 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x76, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5, 0xd58e}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={r6, 0x4}, 0x8) listen(r0, 0x1a0) 14:03:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bind$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf0") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0x1000000000000125, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf0") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:03:58 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = dup(r2) listen(r0, 0x1a0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x4000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'veth1_to_hsr\x00', 0x200}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x10000000000, 0x7}, {0x0, 0x8d}]}, 0x14, 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f0000000200)=0x5) write$ppp(r4, &(0x7f0000000080)="c486a537f9b0f2b710cbef6b4eb80677c174f1b797bb7758b770067e8490594a503529ab762fa52a87dd2712e7653cc505901eba9860013051af0c4408ccf13e9bca92c396568345d1278c11614fc4c6237775ca990179305cb986233829e92b512586cc33d49fc550c32aa733a71dd473dbdd4ddc3f854e5fdf5b7a5c3bc6924e10298e68f93bbebd191220f1f0da3d6473b395af56319bf0fa50c598cf519bb107926249b6", 0xa6) 14:03:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:03:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xffffffffa0010000) 14:04:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:00 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000040)) listen(r0, 0x0) listen(r0, 0x1a0) 14:04:00 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf0") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:04:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x20, r7, 0xf01, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5bfbf9e8cce90506}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xcc, r7, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7fffffff}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcc8b}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5a}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @broadcast}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4008050}, 0x20000000) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r8, 0x0, 0x7ffff000) r9 = fcntl$getown(r3, 0x9) r10 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r10, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r11 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r10, r11, 0x0, 0x7ffff000) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x8000, 0x0) kcmp(r2, r9, 0x4, r11, r12) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r13 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r13, 0x0, 0x0) tkill(r13, 0x38) ptrace$cont(0x18, r13, 0x0, 0x0) ptrace$setregs(0xd, r13, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r13, 0x0, 0x0) 14:04:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1830.198287][ T8419] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 14:04:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r3, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) ptrace$pokeuser(0x6, r3, 0x0, 0xda80) 14:04:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:04:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x190000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, &(0x7f0000000040)) r4 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x7fffffff, 0x40) kcmp(r0, r1, 0xcb9c138d8abc83c3, 0xffffffffffffffff, r4) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:01 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000040)={0x0, 0x0, 0x27, "1371f2e875655594a05453ff39cd7dee52d9c972c5db1739984cdaca5f3cbdc3026582bb04e3a5"}, 0x2f) listen(r0, 0x0) listen(r0, 0x1a0) 14:04:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x5) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:04:01 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) 14:04:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1830.769119][ T8694] cgroup: fork rejected by pids controller in /syz2 14:05:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) perf_event_open(0x0, r8, 0x4, r7, 0x102) ptrace$cont(0x9, r8, 0x10000, 0x200000000) 14:05:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:02 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) write$binfmt_elf64(r2, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xa2, 0x7, 0x80000001, 0x81, 0x2, 0x3e, 0x8, 0x65, 0x40, 0x147, 0xffffffffffffffe1, 0x9, 0x38, 0x7ff, 0x1ff, 0x57, 0x1}, [{0x5, 0x7d46, 0x7f5, 0xfffffffffffff631, 0xff, 0x9, 0x40, 0x6}, {0x6474e551, 0x4, 0x3, 0x5, 0x7, 0x81, 0xd5, 0x7f}], "70f944e1c5904d74b9fd27eb86ca69bf6591b6386767ea3c5bc485baea74c2c0d416410c41a97de47500a1d893eda2a1b3ff25cd28d2c7ab1db70489ad7df56f7bd80e97b999cf93233dd4", [[], [], [], [], [], [], [], []]}, 0x8fb) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) 14:05:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20040, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000100)=""/136) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r0}) ptrace$cont(0x9, r0, 0xfffffffffffffffc, 0x0) 14:05:02 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) accept4$netrom(r4, &(0x7f0000000080)={{0x3, @bcast}, [@remote, @rose, @rose, @null, @default, @netrom, @bcast, @bcast]}, &(0x7f0000000100)=0x48, 0x40000) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) listen(r6, 0x3f) listen(r0, 0x1a0) 14:05:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1893.347748][ T190] device bridge_slave_1 left promiscuous mode [ 1893.354105][ T190] bridge0: port 2(bridge_slave_1) entered disabled state [ 1893.387771][ T190] device bridge_slave_0 left promiscuous mode [ 1893.394033][ T190] bridge0: port 1(bridge_slave_0) entered disabled state [ 1895.327286][ T190] device hsr_slave_0 left promiscuous mode [ 1895.396533][ T190] device hsr_slave_1 left promiscuous mode [ 1895.483612][ T190] team0 (unregistering): Port device team_slave_1 removed [ 1895.496715][ T190] team0 (unregistering): Port device team_slave_0 removed [ 1895.508397][ T190] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1895.592532][ T190] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1895.662773][ T190] bond0 (unregistering): Released all slaves [ 1895.765302][ T9071] IPVS: ftp: loaded support on port[0] = 21 [ 1895.835651][ T9071] chnl_net:caif_netlink_parms(): no params data found [ 1895.953613][ T9071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1895.960888][ T9071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1895.976056][ T9071] device bridge_slave_0 entered promiscuous mode [ 1895.984353][ T9071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1895.997916][ T9071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1896.006026][ T9071] device bridge_slave_1 entered promiscuous mode [ 1896.040860][ T9071] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1896.055257][ T9071] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1896.085058][ T9071] team0: Port device team_slave_0 added [ 1896.093014][ T9071] team0: Port device team_slave_1 added [ 1896.149356][ T9071] device hsr_slave_0 entered promiscuous mode [ 1896.256835][ T9071] device hsr_slave_1 entered promiscuous mode [ 1896.355375][ T9071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1896.362508][ T9071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1896.369929][ T9071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1896.377011][ T9071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1896.454004][ T9071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1896.476255][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1896.485018][ T3508] bridge0: port 1(bridge_slave_0) entered disabled state [ 1896.500089][ T3508] bridge0: port 2(bridge_slave_1) entered disabled state [ 1896.518941][ T9071] 8021q: adding VLAN 0 to HW filter on device team0 [ 1896.539146][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1896.554501][ T3508] bridge0: port 1(bridge_slave_0) entered blocking state [ 1896.561620][ T3508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1896.593701][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1896.602942][ T3508] bridge0: port 2(bridge_slave_1) entered blocking state [ 1896.610055][ T3508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1896.639485][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1896.648824][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1896.657791][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1896.672007][ T9071] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1896.684996][ T9071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1896.693025][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1896.701571][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1896.724900][ T9071] 8021q: adding VLAN 0 to HW filter on device batadv0 14:05:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:07 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x0) 14:05:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) wait4(r2, 0x0, 0x8, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 14:05:07 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3e5b, 0x618002) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000082899500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:05:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x400) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x0, 0x4, 0x8}}, 0x14) ptrace$setopts(0x4206, r0, 0x0, 0x20) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:07 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000040)='/dev/usbmon0\x00', 0x40000, 0x0) write(r1, &(0x7f0000000080)="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", 0x1000) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) listen(r0, 0xffffeffffffffffe) listen(r0, 0x1a0) 14:05:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) ptrace$setopts(0x4206, r0, 0xfffffffffffffffc, 0x64) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0x42}, {&(0x7f0000000200)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c15645b6855c6f551ee56842ec4f7d7c23e3ae", 0xe5}], 0xf92b489, 0x6) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:08 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8000) write$P9_RGETLOCK(r3, &(0x7f00000000c0)={0x1e, 0x37, 0x1, {0x5, 0x9, 0x6}}, 0x1e) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r4, 0x0, 0x7ffff000) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0x2) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r0, 0x0, 0x7ffff000) fremovexattr(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="6f733200233a766d6e650261c8b9616e37b2"]) 14:05:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037d", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = msgget(0x3, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0xd7f7d4a, 0x9, &(0x7f0000004140)=[{&(0x7f0000000380)="e384e770e0210417e986e5a6f5f5eeea5e4ff1a3128bbff84e67351d730bbf6ac4bba6f326c14109cf47b11ef40d232159abd69b46b0d7", 0x37, 0x8}, {&(0x7f0000000400)="3dc782782f71b06e6ffc7cdec6ab30", 0xf, 0x7fffffff}, {&(0x7f0000003e00)="33828a2685746150fcf1a2b78f16c2ac7c48441de78d3b72e954a6f32ceb824af020944a88b37551b45e269aefa69ae3d987d4da1c44f451c931d22009d2add13681b579a9b7aad3313ad01009117e51aab64d83a51ca04db07f317ecd6e184c85f4341d647e683f414404e330aff28705ce2f3af3765ae3bede025702368c8d98add26d662b2cc8ce4db3715ca548697625f391a3981e60d737589b883b41406717cc05a01885ab8be2", 0xaa, 0x1}, {&(0x7f0000000440)="b0ae74b4a35ed62578f30543d0333d8fe2cc7a49", 0x14, 0x1f}, {&(0x7f0000003ec0)="76f4eff10ceeac1161cb8f9bf6b336c9ee9e03f1105daccd83c4fc1c2529120e4d0237d9f128e7f6ec8a06bec0a08d526cc20d5d07097e4a416f8582210568c7faadea0ead6ee1f191964f499f6a36aa07e7780cfe3c0e36e02479", 0x5b, 0x100}, {&(0x7f0000003f40)="e459e6d4b0bb0ceeab928c28943ceead21ab25cd013b73ef64fb06bcf62d99b3ceac7b8882d591091eeec42190a8fdb001bb53bdee29c418df01f5cfaacd9c0b4e4e9272cbbbaae6b18a1367d90ae6c05beb6370325d0f29505a1a5d00205319db6c78c778c841671f6f7f339ef020a829943a", 0x73, 0x870}, {&(0x7f0000003fc0)="8baba533a6b392ea07e9d174877319a183bb3f8c5f00f58b624adbffa1688b0671baba85a9c2d1fba90ee1b69e1d6c2471544ea27f7698b1670e3f158b1e99e3e8053d0e08af202952fef18d8679cb577eb6d0874f99f02931c2ea43a8116d7471daf6e3", 0x64, 0x5}, {&(0x7f0000004040)="d213a87b52baa53975e38c55fd51011404465e5c6b49f14854b05a02430346d26c854579e1ffdfcec79bd894e4ed838f67db033c9704386a8ce75656205ffa66f9c6b20f6629b024da5421ddd97fc733c0ae0487cd0df042cde9498e2fd77d6a0b0cec78199bee3055d60207c3801ad180a130ae4bb391bb9b783058c2fb8ee14a5a2cc72f36a108938523229aa90312772881fd8449a76e2bceb1db00d343a315c918f8d1ea80dfc398251cd12c4ceeb5a53765a1a651ea7a7fd55ad849414d3201d8f5199f1e8d27ecd4ee9ac9f7c252124366d69a9647df451894f9899f67da9dc760", 0xe4, 0x3}, {&(0x7f00000004c0)="35cbb534598d8ad649a16b2e64453cf3f7c64faab6ef867945aa0353a7712d5a", 0x20, 0x34dd30d1}], 0x1000000, &(0x7f00000042c0)={[{@nls={'nls', 0x3d, 'macromanian'}}, {@umask={'umask', 0x3d, 0xffffffffffff8001}}, {@gid={'gid', 0x3d, r3}}, {@disable_sparse_yes='disable_sparse=yes'}], [{@fsmagic={'fsmagic', 0x3d, 0x8000}}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}]}) r4 = getegid() r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) r7 = fcntl$getown(r6, 0x9) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000040)={{0x5d7b, r2, r3, 0x0, r4, 0x4f442b3ba76b6213, 0x7}, 0x1, 0x4, 0x2, 0x5, 0x20, 0x5, r7, r0}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) gettid() 14:05:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037d", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) perf_event_open(0x0, r2, 0x4, r1, 0x102) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) prctl$PR_SET_PTRACER(0x59616d61, r9) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r10 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x38) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$KDGKBMODE(r11, 0x4b44, &(0x7f0000000100)) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r10, 0x0, 0x0) r12 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r13 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r12, r13, 0x0, 0x7ffff000) setsockopt$inet_tcp_int(r13, 0x6, 0x6, &(0x7f0000000000)=0xcf3, 0x4) [ 1898.038556][ T9475] ptrace attach of "/root/syz-executor.0"[9474] was attempted by "/root/syz-executor.0"[9475] 14:05:11 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x1a0) r1 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='%%\x00', 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 14:05:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037d", 0x2a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000000)={{0x3, 0x0, 0x7, 0x1, 0x7}, 0x18000000000000, 0x1, 0x1}) ptrace$cont(0x9, r0, 0x8, 0x9) 14:05:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) tkill(r3, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb22", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000280)=0xfffffffffffff878, 0x1a) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:05:11 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000040)={0x7fff, 0x2}) listen(r0, 0x1a0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 14:05:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb22", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r8, 0x0, 0x7ffff000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x80000000, @remote, 0x7ff}}, 0x10000, 0x6, 0x10001, 0x200, 0x24}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f00000001c0)={r9, 0x33f0}, &(0x7f0000000200)=0x8) ioctl$VIDIOC_G_OUTPUT(r4, 0x8004562e, &(0x7f0000000040)) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 14:05:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb22", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, &(0x7f0000000000)={0x1, 0x4, 0x1000, 0xc2, &(0x7f0000000100)="8bb9cb161c5b797936586f8de8a7713ebcf6ff4bb11cebc7d8ca98a105bf40d8ac4b76c322bcc97ef215ef92c41bd94e655a340bfceeef81aa6b911b96ee3b96875bd29923f61eda7d9a0a47667d0be3a54b0045d643d16a7274bc0cc6bc1ab0f8d308bbdff193e7d0bc77215a12e84697161465f809b7470f1cdf974cfb8b46a8c155fc3759f88215fc22e414ea447cc67c4cc7a6d9998b2e11eaa1eb9d503f1f97cce31cf3e0951978ca0c58ccb165426376a05f687136b593d7a5d102abc4d037", 0xdd, 0x0, &(0x7f0000000200)="8f5efedf8059f2c020d15b2fb88ed92942203a061948e47be26e42c2c017c18a0836c87619ada37d82cb226eb9ed1c9d249a13f36df80cc57fbdfdf1ecd7ac037fb4f22bcb36d89d9f5e6754861f3233ab4c743227d439a9afd67910d0acde1f3bfeb73dc6e0e3adb86dabad07eec069ec8c07966ec11d98ec6a39a6fcc876cfa0e456c426722ea43e164700948ab5de1b1d685c8cb35ae01b679590b5057ad8bd9ce659a058292f68f93b125befe94bae901a447134f6284ef06a6d356ab65e0f59e249d022c98a24356154fc3ec9735e36cbae913ba68297c7f0345c"}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ptrace$cont(0x18, r2, 0x2, 0x73) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x80400001) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000140)=0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000040)="f74702d207dd3f945c5ac6e475b536d3f7478ab7af9081dba3754292c35807fa0a0c0edb521f587f3a5b9ffcb00ac1c58946d6b7ce38640926e7d11a2286fa5c86c2d353f42646f47cac788a798ec0285c9cf1b3f74ff97371f24886fe69e8ceec6c6dd2d549726ce5", &(0x7f00000000c0)="2c3db7b91ed22deb0eb748d3a83f00d6dad23d9423e63da4737f5612593dcdd6a100e81acdfa7fc3397131eab0601c862833396a54eb13737cb5c5"}, 0x20) 14:05:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = getpid() ptrace$setregs(0xf, r1, 0x3, &(0x7f0000000540)="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") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a06788831", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) wait4(r3, 0x0, 0x4, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a06788831", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) ptrace$cont(0x9, r3, 0x0, 0x3) 14:05:14 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ax25={{0x3, @netrom}, [@rose, @rose, @default, @remote, @rose, @remote, @bcast, @default]}, &(0x7f00000000c0)=0x80) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000100)=0x7fff) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') syz_init_net_socket$rose(0xb, 0x5, 0x0) sendfile(r2, r3, 0x0, 0x7ffff000) listen(r2, 0x2000) listen(r0, 0x1a0) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000009c0)=""/4096) sendfile(r4, r5, 0x0, 0x7ffff000) sendmsg$rds(r5, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)=""/87, 0x57}, {&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000340)=""/91, 0x5b}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f00000003c0)=""/153, 0x99}], 0x5, &(0x7f0000000840)=ANY=[@ANYBLOB="30000000000000001401000003000000", @ANYPTR=&(0x7f0000000500)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00@\x00', @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="020000000000000030000000000000001401000003000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB="000000000000000000000000000000000000001b00"/158], @ANYBLOB="9e00000000000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="0000000000000000580000000000000014010000090000000100000007000000", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="0080000000000000"], @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="ffffffffffffffff"], @ANYBLOB="45f4ffffffffffff0700000000000000ffffffff00000000de32000000000000020000000000000001000000000000001800000000000000140100000200000055ffffff01010000180000000000000014010000020000004a0200000300000030000000000000001401000003000000", @ANYPTR=&(0x7f0000000700)=ANY=[@ANYBLOB='\x00'/249], @ANYBLOB="f900000000000000", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB='\x00'], @ANYBLOB='5\x00\x00\x00\x00\x00\x00\x00'], 0x118, 0xc9a493f1accc5cd3}, 0x20000822) ioctl$VIDIOC_TRY_DECODER_CMD(r3, 0xc0485661, &(0x7f00000019c0)={0x5, 0x0, @stop_pts=0x5}) 14:05:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a06788831", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x6, 0x10, 0xffff, 0x1}, &(0x7f0000000040)=0x18) ioctl$KDADDIO(r1, 0x4b34, 0xb2) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r2, 0x9}, &(0x7f0000000100)=0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 14:05:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x20140000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb174", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb174", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x114, 0x12, 0x0, 0x0, 0x70bd28, 0x1, {0x0, 0x0, 0x1}, [@generic="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", @typed={0x4, 0x89}]}, 0x114}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:05:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) r2 = accept4$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, &(0x7f0000000240)=0x10, 0x80000) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x76, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={r5, 0x1}, &(0x7f00000002c0)=0x8) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x3c3202) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r8, 0x0, 0x7ffff000) r9 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r9, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r9, r10, 0x0, 0x7ffff000) timerfd_gettime(r10, &(0x7f00000000c0)) ioctl$UI_DEV_CREATE(r8, 0x5501) r11 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r11, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r12 = socket$inet_udp(0x2, 0x2, 0x0) r13 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x8000) ioctl$VT_GETSTATE(r6, 0x5603, &(0x7f00000001c0)={0xfffffffffffffffd, 0x3, 0x7}) accept4$bt_l2cap(r13, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x0) r14 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(r14, 0x2, &(0x7f0000000080)=""/19) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r15 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r12, r15, 0x0, 0x7ffff000) listen(r15, 0x0) listen(r11, 0x1a0) 14:05:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb174", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:15 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x222602, 0x0) bind$rxrpc(r1, &(0x7f00000000c0)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0x7ff, @local, 0xaf3}}, 0x24) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x6bacafd16e10ac8e, 0x0) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x1) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r4, 0x0, 0x7ffff000) ioctl$VIDIOC_QUERYSTD(r4, 0x8008563f, &(0x7f0000000000)) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) ioctl$KVM_IRQ_LINE_STATUS(r6, 0xc008ae67, &(0x7f0000000080)={0xfa, 0x1ff}) listen(r0, 0x0) listen(r0, 0x1a0) 14:05:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) getpeername$ax25(r0, &(0x7f0000000040)={{0x3, @netrom}, [@netrom, @remote, @null, @rose, @rose, @bcast]}, &(0x7f0000000200)=0x48) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0x9, &(0x7f0000000100)="9748f695fed05fc5d2a45e43a54a2b3ee1826efbc80ca85728227745f4839fc093172a38cacc9ab489140f28d67cf2723991cc7fc974c805e0302457f380f4507d20911c5b861d62a16a3f6472115d429f2a998a68ddda39e1d833fe360e6184ce830d9e432aa68312e832d416c7a77d3195956007e1747013bfbdea3e9071feb279bbe40bde28b3184f25bfdd2216b57244ba031df56ac8789e6eed070e7a1916308e9199c688a5c271a676e7fdb4fca83b58fdb616d6d580ed4a8a83f8da5751a0fb10d4735af7264072c30ca6867020f464") 14:05:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba", 0x51}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:17 executing program 3: prctl$PR_CAP_AMBIENT(0x2f, 0x8, 0x15) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000000c0)={0x17, 0x1, 'client1\x00', 0x0, "bd3ae6cedc908043", "87198c7d991dca2815a4855b92ea4fb32d615d6f51fa65e3ad1d69708869bd24", 0xff, 0xfff}) r1 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r1, 0x0) listen(r1, 0x1a0) modify_ldt$read(0x0, &(0x7f0000000040)=""/50, 0x32) 14:05:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba", 0x51}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/net/tun\x00', 0x644040, 0x0) fchdir(r1) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) sendmsg$rds(r2, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/210, 0xd2}, {&(0x7f0000000200)=""/130, 0x82}, {&(0x7f00000002c0)=""/133, 0x85}, {&(0x7f0000000040)=""/107, 0x6b}], 0x4, &(0x7f0000000d00)=ANY=[@ANYBLOB="58000000000000001401000008000000f7ffffff08000000", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="0101000000000000"], @ANYBLOB="1f00000000000000ff010000000000000300000000000000ff0000000000000000000000000000000300000000000000580000000000000014010000060000000100008002000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="0500000000000000"], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB="0500000000000000"], @ANYBLOB="090000000000000080000000000000000600000000000000ff000000000000000800000000000000090000000000000048000000000000001401000001000000040000000900000084ebcc4880493ee5eb0c46d2fa929903b39e2bcbca91ef7de47728ce3bad92f03705ddb74344bfe159b549f1f4887e9ba9600b05a28ec4406390f018fa2362e1caf6dff5dda64b96668e683e7ba5b7a37e9152b483792f6c754345234875239c6cfd1a4a8df261fdfa15f03afe1f715de0048650537866b4b987f9351b3737048e6eda04bb2d5008c500"/223, @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'/214], @ANYBLOB="d600000000000000", @ANYPTR=&(0x7f0000000ac0)=ANY=[@ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00'/162], @ANYBLOB="a200000000000000", @ANYPTR=&(0x7f0000000780)=ANY=[@ANYBLOB='\x00'/220], @ANYBLOB="dc00000000000000", @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB='\x00'/131], @ANYBLOB="8300000000000000", @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB='\x00'/189], @ANYBLOB="bd00000000000000", @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYBLOB='\x00'/178], @ANYBLOB="b200000000000000"], @ANYBLOB="0500000000000000080000000000000008000000000000001800000000000000140100000c000000a500000000000000"], 0x110, 0x4}, 0x4000) fdatasync(r2) 14:05:17 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @remote}, 0x3, 0x2, 0x4, 0x2}}, 0x26) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000040)={0x4, 0x1}) prctl$PR_SET_UNALIGN(0x6, 0x2) listen(r0, 0x1a0) socket(0x860ebb0edb7c0276, 0xa6926d181ddc26d0, 0xfffffffffffffffc) 14:05:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80001800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba", 0x51}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x9, r0, 0x7, 0xfffffffffffffffe) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) read(r2, &(0x7f0000000100)=""/149, 0x95) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x81) ioctl$TIOCNXCL(r3, 0x540d) ptrace$cont(0x7, r0, 0x6, 0x2) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x101000) ioctl$TIOCMGET(r4, 0x5415, &(0x7f0000000080)) 14:05:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:05:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:18 executing program 3: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40e200, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) 14:05:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:05:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:18 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000040)={0x4001, 0x401, 0x674, 0xfffffffffffffffa}) listen(r0, 0x0) listen(r0, 0x1a0) 14:05:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x9, 0x2, 0x1, 0xffffffffffffffff}) ioctl$FICLONE(r3, 0x40049409, r5) r6 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r2, 0x102) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:05:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4200, r0, 0x8000, 0x3000ad) tkill(r0, 0x38) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000100)={0x21, 0x3, 0xc, 0x3, 0x1, 0x8001, 0x6, 0x5e, 0xbbf5ed173b2eb523}) r2 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x101082) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000040)={'ifb0\x00', @broadcast}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) ioctl$PIO_CMAP(r5, 0x4b71, &(0x7f0000000180)={0xb7, 0x8, 0x1, 0x8c, 0x5, 0x9}) ptrace$cont(0x9, r0, 0x0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x4004000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r6, r7, 0x0, 0x7ffff000) ioctl$FITRIM(r7, 0xc0185879, &(0x7f0000000140)={0x3, 0x5, 0xfffffffffffffe01}) 14:05:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:18 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) write$capi20(r2, &(0x7f0000000040)={0x10, 0x3, 0x84, 0x147, 0x8, 0x7f}, 0x10) 14:05:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$nl_route(0x10, 0x3, 0x0) read(r1, &(0x7f0000000140)=""/5, 0x5) ptrace$cont(0x9, r0, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x6, "badb21f88231"}, &(0x7f0000000100)=0x2a) ioctl$int_out(r2, 0x7e50, &(0x7f0000000040)) 14:05:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:05:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:05:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:19 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) r5 = socket$inet_udp(0x2, 0x2, 0x0) listen(r5, 0x1a0) 14:05:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r6, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r4, 0x0, 0x6, &(0x7f0000000000)='#&em0\x00', r6}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r7) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x38) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f00000001c0)={0x0, 0x8000}) ptrace$cont(0x9, r8, 0x0, 0x0) 14:05:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:05:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80, 0x400000) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:19 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) ioprio_set$pid(0x2, r3, 0x626) listen(r0, 0x0) listen(r0, 0x1a0) 14:05:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) move_pages(r3, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000040)=[0x5, 0x10000, 0x1], &(0x7f0000000080)=[0x0], 0x2) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:05:21 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x12) fsconfig$FSCONFIG_SET_PATH(r2, 0x3, &(0x7f0000000040)='&\x00', &(0x7f0000000080)='./file0\x00', r3) listen(r0, 0x130) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x38080, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000180)='net/udp\x00', 0x0, r5) 14:05:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:05:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:05:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:05:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:05:22 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) migrate_pages(r6, 0xffff, &(0x7f0000000340)=0x7ff, &(0x7f0000000380)=0x7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = getpid() ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000280)=0x0) setpgid(r10, r11) perf_event_open(0x0, r10, 0x4, r9, 0x102) ptrace$pokeuser(0x6, r10, 0x19, 0x800) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000300)=0x7fff, 0x4) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14, r12, 0x11}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xfc, r12, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8a98}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x63d2984b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x16b4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfc8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1a5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffe1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7c7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x86e0}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xbcab}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) r13 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x1f, 0x0) write$P9_RCLUNK(r13, &(0x7f0000000240)={0x7, 0x79, 0x2}, 0x7) 14:05:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:05:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:22 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000040)={0x7, 0x1ab, 0x2, 0x0, 0xfffffffffffffff7, 0x1, 0x1, 0x81, 0x20, 0x400, 0x0, 0x22, 0x0, 0x0, 0x4058, 0x52, 0x6c2a, 0x2, 0x4}) 14:06:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:06:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:06:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x94, 0x8, 0x0, 0x6, 0x13, 0x22, "dc303d9bf8abb340056e8e63759a1734c252f7b384571540a63cd9f1561689c4c3823a93ce8c25e9551f16b3b4be05802665f2edc8c3411a49f969580ebf633e", "ad7de2f789f6b477de9ea6b05ac5bd18aafe089e32170d7dd0819a444ebc54bb46ff703187a8dddb6b6422d6c5209d8aefa70c241d38ce2f25632652285586c0", "a4289df85dce0a288b8b80b7c467e2413d7d91f609a8fec9715719e90f6bb664", [0x1ff]}) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r3, 0x0, 0x7ffff000) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r4}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000010}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)={0x298, r7, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf74}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK={0xfc, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb00000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x58}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x359}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcb3b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}]}, 0x298}, 0x1, 0x0, 0x0, 0x800}, 0x4002000) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x65813, r3, 0x10000000) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:22 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:06:22 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7ffff000) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000340)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x228) listen(r0, 0x0) socketpair(0x3, 0x6, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="7ccab956a8102142d85b3b6e000000492fa566"], &(0x7f00000000c0)=0xa) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2c3, 0x77e8574f6820470) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000240)={r5, @in={{0x2, 0x4e22, @local}}}, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r3, 0xab00000000000000}, &(0x7f0000000140)=0x8) listen(r0, 0x1a0) 14:06:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:22 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:06:22 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:06:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:22 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001040)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040)="80b6f07486868068973f655d6ccb6c84405f74c269ade2b72d1e91ef688c09fb41895583a638c6a6f3e3186385833d5f18d6fca1d054789a40749a1962521155e7af060bc950e1b10d3a035f9c406254c5830b26c96844afac58b370aec03459f3b776dffd225b67d485b6dbd355856be748bc6699f9ddd00c3e2db49be4a4ce78cc888772a45a26cab0b7b8f328c3e7294c2867cd19c487fa08ee3cab4db58320e5b97eaa85e5b18651278e93b91e6b1dc06ac6f9df088913becc8c0c408a6233d35faf0a767684d791d21b68f0b6a0afd432a94695a7eb6558ecfacbce7554054b6b4c1e65f56e316121163dd6577903352b8e50dfa2501e885e18fc27b4ebefcb39cb065f956ae4d559073ef314e7ff065e7720e31905048a84b8d5bec6db54e3ff3156ed2a24311d04d01ab26e2fd25da67d985019e6403e29f6e2a2cae8601e396a9b4ce7d60fcf8fb43c5195be0dfdda6992182a7d1912bac499f8dc95ef61ae1bde0dc40cfd6ad3eb7dff100ee6895d4ab12f42b1f19a5b949d129eefb83f2ed00ccdec28070e6dbb9b94000be1a6d50d48e1048c3cfa4e4ae84573375e006fd3beda06a344084a5fce58d9a52da55e0cff44edc0a78885fe22f0c075687f4a7e3d55b65c41b064b1648a03b877e3f5179753345654588d113eba54b4829cfcab2c8556dfb35ea0d5531988918b6d4d3e4759df8f3554285bf40d90d52984c86240188aee4fd4affa1b10b1c2eff0bb03eb9faca57279ed05bdc8f26acbd6900bb89d6a5c987e52a5d97d83df03f2b963724ad75063041663e12a7932bf0f9b075969e7b4dede39468f930aef9d30665a3dbbf43e90d896dcdf3fc81575fd7260ef1280c2bd7f702690067d1cf5642418c8c1c5f12b8e593b7786fb52983b0d048377d635940afde117db71b6c5b4e0fe2484682d9ca228d00dace9e8bae7b29e5d2a9311c64059ea8b4b9939bb6926393c0389b2fbf879f91f03b2cc5da3845b2f5babc1465e645853a85ba8bd24e6e4781a26c39b6f65009508587c84ff6a68bcf179ff060c10803902a17e00aa04cac5f00d50e7a19a4c23089da97744ecf8c32c0b66e05de3bc151378ad95934ac14149a19eac1b61bb3ba572e5964ea0c67a62238436459556f67468a23efe80d7a15f89cfb584781e744ed2882b6f3fd7c968b808b2851a533938a37d67eb9eece7fcb9053d3cf6356d437efabbd6fb6db9d226d813eadfd5cff427c81cd37592430818854c423745e456e1d1fff4957a05f3e6f60f2f5f73ede5b5cdb03eb8a6549c5d1673bd01e083e2c3d1d5ff1f7c4b0c5a78fd2c576421a26bf7e5955044b788a8ad248104f3e367e1899a698405460010871ccfe3f6f830119855baee358a720c9d5ca2f3026bf19713e7ecf4f2b165422dd2082a009595143923590db34ac17db6f95456f9c6ac3a007e707ec3a4cb935158320069a4fcaeca4ed551eb3db1edb2ef665b05acd688e02ce0128816f8a5e34e11cdc5463e5deac88c663719aeb978dcc456d4114a28eb3f3baaac5cf73e3c2e555acb37fddf5df679ae8731a8f7ed5ddbe10f61c90ecc012f4dde0471ea09d9ec3712451f056deb76dae70c6678995100ef9d9dc25ff29eaddf2d30ae64b0039fe810c36836e5c4b95807c4dd444afa2592409d671775dd4c46120f3b513cf5ad0490748ed161023b595c383f4aea50930836a3e9b8e0f558f54057384a662c94a794f96083d6eebf814dc70bf23b15750a5b7df383aad463be71ad60a7a0a75a830bdddca85dc8c8ea19761992dfcffad837ad7e7dcf21d5f86bddddd244f6533fe24560e6f569a5a9bbc62e7d8f49d12b206c57c90b6ed3308146e972341153bfafad087e460512c48ba23cbc4053b41262ce9ebbe2ea32f4232993aebf84ed4590d6b3c9299544066f9c694826ddc8a27dd4d5a656a2e27271b43c0fd84b4097f722d976a3604cf08f27a60f97253ba772b7b8049cbc8b3c544a30eaafdfe756e51106649ef11e84808db97d1a357cbd5d5f95f062550390216f7ce6f7cf1579cc7941e57f607b382d0fc9418e79ece272d3f2888c38fea8122e5e185ed42f69d82bcab2d5b46aeb394870bd97a864da8cebdb3183cb83398741ad02016b75e9f84033c133e88d09130e0b771a5ea93b07eda1ae7e5ce7443626d0918f0b265efada187663647119b0f3868af7c5fa46224a27ea815eeeabefbbd6b59a5f2dc823517eef1fc65c09bbf35386cfd604562aa0451b6632fa0476f0e56a8e497eb4a7f8e2d8de3cf8e63ee4a74aa713dbe70c3d10b347991407aa3a30bba158de32477a839ff52bf3ceaf22a1effe3ea64643cdabbaa38473d40788cc8a5ea9f201edb115a3cc2822c2560303a8c77435bb67303af1a4d99bcae178cbf5ab709048f55a3ef2e7dc038ac2ca676a43d2b024da95870ee6aead593d9ffad21b7ab0fe2891d960740212e6b579a7f8695fc4cc079b8abd508293971be7ad20c13691749df421c1f63c248afe6586f7fc27fdb6876058a99e7f2f9f194f5f476cc76239af95be03b1b9b6437c7671bae223135d02e493f96bbb5ab171e83eecb78b6d8f3f83cefed840e03c72fbad12cb106a884617d428c48285ceb61c9af32e29590f340649a2e42e1d147b9083c43a8822b5622676b1f9b33563c31cb7ec41fb53be2d6c23051ced42d0ced9b8c0057384ff9e9e438e0dc85c74159895d50052fd55f44c4cf2c0b648fe7643440ddd12bb55d08c6cf78dff1c46ece9b1c32db5bac6911bf96487e8df0a674bc1f2d274120d1cca019595c94e753ffeda3fb5836aa847b40c2a6f329f3d80e4af92f7562222b6e195751cff3f6731e56357d750b6a9de0dff28ae6f071424d465c8563df4eed432e58416f9cd46fa7b4b7dc711a1c92fc845d70919b85cafe290edc059aad40da21e4b3baf62c972db8ecf8f118dec88cd9669add5a693fae1a5d5951b66f97a1bb451c95b79687e20fdaf7d40f962c97ad80811518b99dcc193b552d76561fcd5b5c7ffcb72533a4b2212d061e71c907b9cd9166bcde5574aa7aeb23c4175085456a4640b98328ba58e521f323ca8501d8e62556ad21867681f65ac05a928f63968b224babbbeef5caed2575bc7634db2654b3485e55a2a933359d6089cc603a2ce41fd9cef8a449806624bb1a759889f6af6c18898fd97e0eed97e5ccaae75f26fafafe207a6c54d6e0d3bea5810d4cb84629d3fc2956a358e2bcb0d0b1eda19ffa4024a3ae88df0c91138e685ea491325cc6019848f1062e58e5078367c5fb6d62c86b772f6fca9b5ac687057d266e702934e4d9618421ad3f72e53de9487138ae7ec406dc27ba802670c269003ee9bdcaa8eeee678cd0418fad77bf680c22223768840f1a5e83b09007db41114f7bbd86681b50fefc9ab060436e4bee90124740895701d3fcd95365e3a1fcb81f8d6522fe445480b2e39b7596289bb82bf244552e5da388934025c4d8e0614dd2e3fdc4ce142ce364f7221e85b79112a89c4645ffe69e9a976e17f75542ac6c93226a8eb2e406cbe63fc580cd5cfb046f7cc2e78bf1dfdad962db6ee2c7bb2befac1e52f66f7e17eea095b4c20f73f289d40c31262ba85ae7f1bf8bbe085d39d39d37d868ce254a2334ee39c864af4a2b54aa8ba96af8ec38eeba19b12bb207d316be1465f25f4f3daab3bac028b930db4fc5c1f928db4c7fda571aa48e4fdbda1873b3956f3559296e17059a500146436d320f2a45c34e1f31882df0c7945254908fa2c90409da0877929c95a27891fb615071415e47e81ca577b9616c3d047b7978d21dd3c041820736bcc79a019459cad281c8b5eadc62b2ce9359a5cec85fc982c57a37173154bc8b7ae25f46711b2e407db18539509817185f1494396a2a5269d7acbcc4e40f31e9031b1969fce1e89cb0cf6c772f863f24f773e11770063862f84e292366515b59263f4d5a3a9f862740ae921b6d0da98dcb2a7e85a8dda038bf7974814b042b374cfc47c4cd64007147b227c6c993a3ab02e4e2da37d421f416a432ead26a47cc41ff8dd699670a01b902866cbba4148b977975b9c67d9385ffa5e55231ffd8bd03db85402d7d7a02b3e8491dce28360f3a8402bea5e785ca0800c29ec4543d9a7d35842f5a4db203480e40237994a3c259239b1faef06b9a85561acfcc09c9e4faae9f458585a427e79624afe7fc123da77f20aa407e17858b60a71d67acb4426c1b090ddafa71f0fb49894165c5154c9356336085ecd8b4a889127425fb58875bbd5082d97c6192e33eae80b1cd62a7cca507c1798a571b9af513fd2a1321b4cb101fa943725a9d9145f1b1b6a677103216908b2d2e9d4af554cb8570543fb81382cb912e4513f638a6181f18b91c128c9f98a467efde8f243bb8f3ad096924686fefe739b497198018841db43535b6bf09baa9b645755cf81880ae4b5c39c95da6fd6833aa89c4ac1b4e304a23af547b0c38bf23baa5427b820d8330f3066fd79f234cda0a8201636309aec7a30e574ba8e78c0260fbd6693a5d9f6114586e9281eccbfaeeb63d83be21673f9660d48988ee6b2f9e0967bd56db8dd9461317c7f77076fdadb016bfd123e52c9934d24333af6b626b7a14c9ff535359ed67b1d235cec56bf74d49f606c0fa90db7301e8b7fa64fe42e543b0c6fee012c8f41f7f66b6ac1b446cd8d440dff06fecd1b50e60ded7f90cf52007c85d23166321f202815d01a65b6f0b0c7a9e2c1d876c8edca7bc25bb70befb92e56b0c2e5a922f2d95f99596508c8f5e90b2d879ec3e50a859775ffd72178f57a93bea6f1f9e6be5fc63f5393c6cc5fb8a23edbbe4ea04f3cc2ca635e3d3494e209c9934655afc50b2d0f623242bfcf4a348d726d49e1944ba696b110bfe98b5a64ddc191f7f5056d97f70f30c72b4d8ff97093375afffd8083ba3498e74a5d369106357185374a01ec91be899a0bd40066499a60f554dabcaa6265e7367b827726ff8496a33b207c76309a9247eb2130a22ccf7fdafc0e57d557dc5c781d29010c68d045ab07da0780d7feaa26adcd9e576d6ec24f6ab8ea000f72a32d9e8397b5e47ad142f4dc0177eb9c27b0df0699119c2f82bbfc54835f1e2ee8f1017841efec417661ec84c3d2a85922d13a22a41761cc981026ec43557732ffd6c2784728ddceb9b90f970b7f2bad2480fb8d5496ae280e63fc07276878123d687521ab70f9441ebacfd87cf6d5afb49da0bef663fb5525077d79be96748e601b35038ad96f5d0800906793491a32fb8157ea139b402015ec63e5a018335c668596add599dd2656d4efd96d5706f5dc35310c121a95a87066cde80e8ddecd68dec1c4f5d89959cbc6f2cdcdf178020e084db1b212137ab47b17f6aff53657aa4fad7fc70a993e1505c4242c249406c8bf50580c1880623653f49f69ee33d1de40a2823b563402cff4cce930f16fea4da5989c96d608ad0d1e662717f72d1153c9fd7ffcce473a06fed81fb16fb5dea3bc9161e55199f9f9a67f780369228d88760c469193188e5bda081c57ad172b78cc630685462edc9cd50af5a5f9ffbc7d7681771227c8155b2d83241df882dec92d183dca8d32d2bbe6a899543e528dbaa457cf15a625e1ff47fa56d958f0d99729111e0eb8610d20ee0a15ff0848f1547377d27ed1423219fbabc2abe06cc62232e54e4f14759c74f7242c9b37ba653210ca1316dcaedbfd202bd8151def111028ad0cf8824a07a2ad5b3d7464a389c2f893a81690d4a571a980858ea704671ed59c3c7937", 0x1000, r0}, 0x68) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$KDMKTONE(r3, 0x4b30, 0x34) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r4, 0x0, 0x7ffff000) write$binfmt_misc(r1, &(0x7f00000010c0)={'syz0', "a84d835809dff310681d8fd2fbd1fd3cf2c232a9d2e440b256568c3444cf4f3823c4dad66de7f73080205c59683c81813eb3a577a5b90cbb46e6c80db828fd2d25c05a11e70f3e7ee2964ce416e2790c315af380f404d2e6f66114b2bd741273dd8f28e177dd5d98e8416637e36fb2ad9b6c536c8bffc20a0495562827014fe04bc702c3b67007fcb158e715b52980dceb20661f4679650f2028ba617bfde9"}, 0xa3) listen(r0, 0x0) listen(r0, 0x1a0) 14:06:23 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) [ 1972.537495][T32565] device bridge_slave_1 left promiscuous mode [ 1972.564059][T32565] bridge0: port 2(bridge_slave_1) entered disabled state 14:06:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) [ 1972.643462][T32565] device bridge_slave_0 left promiscuous mode [ 1972.662580][T32565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1972.838258][T32565] device hsr_slave_0 left promiscuous mode [ 1972.876580][T32565] device hsr_slave_1 left promiscuous mode [ 1972.925478][T32565] team0 (unregistering): Port device team_slave_1 removed [ 1972.938869][T32565] team0 (unregistering): Port device team_slave_0 removed [ 1972.949915][T32565] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1973.033677][T32565] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1973.123690][T32565] bond0 (unregistering): Released all slaves [ 1974.010972][T11795] IPVS: ftp: loaded support on port[0] = 21 [ 1974.091146][T11795] chnl_net:caif_netlink_parms(): no params data found [ 1974.126551][T11795] bridge0: port 1(bridge_slave_0) entered blocking state [ 1974.133725][T11795] bridge0: port 1(bridge_slave_0) entered disabled state [ 1974.141815][T11795] device bridge_slave_0 entered promiscuous mode [ 1974.150040][T11795] bridge0: port 2(bridge_slave_1) entered blocking state [ 1974.157266][T11795] bridge0: port 2(bridge_slave_1) entered disabled state [ 1974.165254][T11795] device bridge_slave_1 entered promiscuous mode [ 1974.187588][T11795] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1974.199009][T11795] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1974.219979][T11795] team0: Port device team_slave_0 added [ 1974.227060][T11795] team0: Port device team_slave_1 added [ 1974.299722][T11795] device hsr_slave_0 entered promiscuous mode [ 1974.336716][T11795] device hsr_slave_1 entered promiscuous mode [ 1974.376536][T11795] debugfs: Directory 'hsr0' with parent '/' already present! [ 1974.421962][T11795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1974.439569][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1974.448102][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1974.460037][T11795] 8021q: adding VLAN 0 to HW filter on device team0 [ 1974.470676][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1974.479937][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1974.488445][ T2835] bridge0: port 1(bridge_slave_0) entered blocking state [ 1974.495507][ T2835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1974.518826][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1974.527600][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1974.536271][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1974.545036][T32674] bridge0: port 2(bridge_slave_1) entered blocking state [ 1974.552131][T32674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1974.561160][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1974.570076][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1974.578726][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1974.587540][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1974.595919][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1974.604834][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1974.620120][T11795] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1974.631245][T11795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1974.644049][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1974.652731][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1974.661194][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1974.669829][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1974.688543][T11795] 8021q: adding VLAN 0 to HW filter on device batadv0 14:06:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0xa0818000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x101, 0x800) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:25 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:06:25 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x76, &(0x7f00000000c0)={r4}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e24, 0x8, @remote, 0x400}}}, 0x84) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) recvfrom$x25(r6, &(0x7f0000000040)=""/16, 0x10, 0x40001000, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) listen(r0, 0x0) listen(r0, 0x1a0) 14:06:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:06:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 14:06:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:25 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x44}}, 0x0) 14:06:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:06:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1f) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14:06:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:06:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r6, r7, 0x0, 0x7ffff000) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = getpid() ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000280)=0x0) setpgid(r10, r11) perf_event_open(0x0, r10, 0x4, r9, 0x102) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r12 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(r12, 0x38) ptrace$cont(0x18, r12, 0x0, 0x0) ptrace$setregs(0xd, r12, 0x0, &(0x7f0000000080)) r13 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) r14 = socket$inet6_sctp(0xa, 0x1, 0x84) r15 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r14, 0x84, 0x76, &(0x7f00000000c0)={r16}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r13, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=r16, @ANYBLOB="ff03060000001feb5c10b1da0875b76e"], 0x14) ptrace$cont(0x9, r12, 0x0, 0x0) 14:06:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14:06:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:26 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x27e, 0x2) r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10, 0x0) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x76, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x14) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) ptrace$getenv(0x4201, r9, 0x7, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)={r6, 0x7b, 0x1, [0x8]}, 0xa) listen(r0, 0x1a0) 14:06:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14:06:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0xe) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) clone(0x800, &(0x7f0000000580)="dd273e18cb7e863826ce3db0c80fd21041c2195ac270a09bacbfecd1efca2da653f570b150df167c7c408acab9a9528edd8be67bfe061a31b013f1968ef456e9d978c049755a1a695c7d66452b7352478b41da0fc68b23f01d06efce781f493cd04ca54c314ad17590080a5fe6146102e11450c9c6ac30bf41e9c1adebda7dffcaadc1133b21a0596e43b520a539", &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)="776b194bfca826209fad19330646a2a42f310083c5452f5b540c83063202442a3b45ef9826430674fa0cbf458c57662719cee13f10263b019879fad75b1ba106dbd1778938406b489a296e45e591bddf090c0e30f2849d45b1c5c5b945e8520bdb2eb790b35d44dd4683b4a0") ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000080)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r3 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x0, 0x8}, {&(0x7f0000000100)="c72088bd6ccee53357285b8423b3fa3a988f9c2e66431013b83141ad094b04ce01cafe705fbf057fcf5baed5b76b21c6e8eb3ecfcdeec7e0e0a263205e9878d72742423674ffd5a4de08c4291e39f85315b85da685c1652bdf0a9ab012b8fe0633fb4704f1a427557df7e5a7dcd7e3907bdc63a410b71308a73c58429184d24b5a488c93224e9f53226b9e1d7996e61e4b2290f2891935578094bfa829672e754983bfd75fbfd58309a1bd42a47d797419d0db9d14783b6f2b8e14953d598c7b23b72f1cb0f947cf7be664082a1dc4ba51740cf3fb3523d3aa", 0xd9, 0x100}, {&(0x7f0000000200)="b346a4a89e97e23763ea130f8481fb4ceb3cd42ce9ba2113e1a8f97d12273622d6c536c4f63abd8cde4a119fb872877f8880daa28f88b8469064f97056754911deb79250fe38e52ad0618ddfcdb0175a493b893a4b78c327bd2b82e58d486704704ae1896de87d71f82128dd010e74616a0f33579c7ce289eb4dab58f39570d7e45f791b1cada6bc22817da104ff07", 0x8f, 0xffffffffffffffff}], 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='noacl,nouser_xattr,acl,user_xattr,user_xattr,noacl,noacl,user_xattr,noacl,context=system_u,uid=', @ANYRESDEC=r3, @ANYBLOB="2c6dc9e1737572652c6673706f6e74657874feffffffd74564baa0657569643c", @ANYRESDEC=r4, @ANYBLOB="010000000ea205386b00ed0a00"/24]) [ 1975.452757][T11958] ptrace attach of "/root/syz-executor.0"[11951] was attempted by "/root/syz-executor.0"[11958] 14:06:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 14:06:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x232000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) perf_event_open(0x0, r5, 0x4, r4, 0x102) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file1\x00', r1}, 0x10) r7 = syz_open_procfs(r5, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r7, 0x0, 0x7ffff000) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x90801, 0x0) move_mount(r7, &(0x7f0000000000)='./file0\x00', r8, &(0x7f0000000080)='./file0\x00', 0x10) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f00000001c0)={0x1, 0xfffffffffffffff9}, 0x2) ptrace$cont(0x9, r0, 0x2, 0xfffffffffffffffc) 14:06:28 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) connect$caif(r3, &(0x7f0000000080)=@dbg={0x25, 0x4, 0x8000}, 0x18) openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) sendfile(r1, r4, 0x0, 0x7ffff000) ioctl$VIDIOC_S_HW_FREQ_SEEK(r4, 0x40305652, &(0x7f0000000040)={0x4, 0x5, 0x0, 0x2, 0x464, 0x9, 0x7b9}) 14:06:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 14:06:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:06:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, @in={0x2, 0x4e20, @multicast1}], 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000280)=0x0) setpgid(r7, r8) perf_event_open(0x0, r7, 0x4, r6, 0x102) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000080)=r7) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = getpid() ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000280)=0x0) setpgid(r11, r12) perf_event_open(0x0, r11, 0x4, r10, 0x102) ptrace$setregs(0x13, r11, 0x800, &(0x7f0000000100)="49250b984f6649264c9c7c92521c41e3f588d33628cb2821622b8a62ee3de69f0f5ea33401004aec357d869762f3e8fa5cb6c7f294717944eac05de58f5722d1e3275dc52501000000000000005d9b39236ea80e39c4a9b39a66") ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 14:06:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) signalfd(r0, &(0x7f0000000000)={0xaa0}, 0x8) 14:06:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)}, 0x0) 14:06:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x199d4055, 0x101000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x4ce73a8d63ff8ee4, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) write(r1, &(0x7f0000000080)='3', 0x1) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(r3, &(0x7f00000001c0)='net/stat\x00') sendfile(r4, r5, 0x0, 0x7ffff000) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r6, r7, 0x0, 0x7ffff000) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r8, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r8, r9, 0x0, 0x7ffff000) r10 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100100, 0x80) fcntl$getownex(r10, 0x10, &(0x7f0000000240)) ptrace$cont(0x9, r3, 0x3, 0x8000000000000) 14:06:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)}, 0x0) [ 1978.594420][T12216] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:06:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x7) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) connect(r2, &(0x7f0000000080)=@in6={0xa, 0x4e20, 0xb74, @empty, 0x1}, 0x80) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r4, 0x0, 0x7ffff000) shutdown(r4, 0x1) 14:06:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = accept(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x20000000) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:06:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) socket$rxrpc(0x21, 0x2, 0x2) 14:07:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)}, 0x0) 14:07:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400080) write$cgroup_pid(r3, &(0x7f0000000040)=0xffffffffffffffff, 0x12) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff6920, 0x200) r2 = getpgid(0x0) ptrace$getsig(0x4202, r2, 0x340f, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000004300)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf2516000000201072000c008d006f0000000000000008004000", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="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"/588, @ANYRES32=r2, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r2, @ANYBLOB="4e283238db135c1e256c4d4faab00ca4c62a6908000000afe3066e33d70bcc3998b509a2061c16e9a4104241f2ad93de826b84117497d34664010a44dda7c54681f2bd6ceac5cbf82648a2fba0b8ba5c1901c40a57d3313c7da75abce88229f48d861740ff1859c4e1decc8366b406fd8d977bf76761ed77ab81781ef8bacbbec81d332e524104bc37f50a86b6270b84026ecff98715fdc3eadd2bff325000c29142332101ffffffffffffffe8e62ec5eccab4da99048cb7ecf11e9db445f83d006b00080022004d4737d5ffe2a325000000000000000000007ae74878b5bd8c11d05e215e8c94a1720fafc5bc44f908e051c29cf7f41823a32cebd01e1e263d0f443a3e9cb21b97d27a49f816877795ac41f6a348c45977c5a76fb38ab818e6924d2f1859ee41e96b9be10f3586108d5d2cba6111f7fa81465a6a7ea3f192bcd9a823e6364173b397e5c8e2040f30cfc7f6885442cb2ce1c718d81219bb3876"], 0x9}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0xd7f7d4a, 0x9, &(0x7f0000004140)=[{&(0x7f0000000380)="e384e770e0210417e986e5a6f5f5eeea5e4ff1a3128bbff84e67351d730bbf6ac4bba6f326c14109cf47b11ef40d232159abd69b46b0d7", 0x37, 0x8}, {&(0x7f0000000400)="3dc782782f71b06e6ffc7cdec6ab30", 0xf, 0x7fffffff}, {&(0x7f0000003e00)="33828a2685746150fcf1a2b78f16c2ac7c48441de78d3b72e954a6f32ceb824af020944a88b37551b45e269aefa69ae3d987d4da1c44f451c931d22009d2add13681b579a9b7aad3313ad01009117e51aab64d83a51ca04db07f317ecd6e184c85f4341d647e683f414404e330aff28705ce2f3af3765ae3bede025702368c8d98add26d662b2cc8ce4db3715ca548697625f391a3981e60d737589b883b41406717cc05a01885ab8be2", 0xaa, 0x1}, {&(0x7f0000000440)="b0ae74b4a35ed62578f30543d0333d8fe2cc7a49", 0x14, 0x1f}, {&(0x7f0000003ec0)="76f4eff10ceeac1161cb8f9bf6b336c9ee9e03f1105daccd83c4fc1c2529120e4d0237d9f128e7f6ec8a06bec0a08d526cc20d5d07097e4a416f8582210568c7faadea0ead6ee1f191964f499f6a36aa07e7780cfe3c0e36e02479", 0x5b, 0x100}, {&(0x7f0000003f40)="e459e6d4b0bb0ceeab928c28943ceead21ab25cd013b73ef64fb06bcf62d99b3ceac7b8882d591091eeec42190a8fdb001bb53bdee29c418df01f5cfaacd9c0b4e4e9272cbbbaae6b18a1367d90ae6c05beb6370325d0f29505a1a5d00205319db6c78c778c841671f6f7f339ef020a829943a", 0x73, 0x870}, {&(0x7f0000003fc0)="8baba533a6b392ea07e9d174877319a183bb3f8c5f00f58b624adbffa1688b0671baba85a9c2d1fba90ee1b69e1d6c2471544ea27f7698b1670e3f158b1e99e3e8053d0e08af202952fef18d8679cb577eb6d0874f99f02931c2ea43a8116d7471daf6e3", 0x64, 0x5}, {&(0x7f0000004040)="d213a87b52baa53975e38c55fd51011404465e5c6b49f14854b05a02430346d26c854579e1ffdfcec79bd894e4ed838f67db033c9704386a8ce75656205ffa66f9c6b20f6629b024da5421ddd97fc733c0ae0487cd0df042cde9498e2fd77d6a0b0cec78199bee3055d60207c3801ad180a130ae4bb391bb9b783058c2fb8ee14a5a2cc72f36a108938523229aa90312772881fd8449a76e2bceb1db00d343a315c918f8d1ea80dfc398251cd12c4ceeb5a53765a1a651ea7a7fd55ad849414d3201d8f5199f1e8d27ecd4ee9ac9f7c252124366d69a9647df451894f9899f67da9dc760", 0xe4, 0x3}, {&(0x7f00000004c0)="35cbb534598d8ad649a16b2e64453cf3f7c64faab6ef867945aa0353a7712d5a", 0x20, 0x34dd30d1}], 0x1000000, &(0x7f00000042c0)={[{@nls={'nls', 0x3d, 'macromanian'}}, {@umask={'umask', 0x3d, 0xffffffffffff8001}}, {@gid={'gid', 0x3d, r4}}, {@disable_sparse_yes='disable_sparse=yes'}], [{@fsmagic={'fsmagic', 0x3d, 0x8000}}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}]}) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0xd7f7d4a, 0x9, &(0x7f0000004140)=[{&(0x7f0000000380)="e384e770e0210417e986e5a6f5f5eeea5e4ff1a3128bbff84e67351d730bbf6ac4bba6f326c14109cf47b11ef40d232159abd69b46b0d7", 0x37, 0x8}, {&(0x7f0000000400)="3dc782782f71b06e6ffc7cdec6ab30", 0xf, 0x7fffffff}, {&(0x7f0000003e00)="33828a2685746150fcf1a2b78f16c2ac7c48441de78d3b72e954a6f32ceb824af020944a88b37551b45e269aefa69ae3d987d4da1c44f451c931d22009d2add13681b579a9b7aad3313ad01009117e51aab64d83a51ca04db07f317ecd6e184c85f4341d647e683f414404e330aff28705ce2f3af3765ae3bede025702368c8d98add26d662b2cc8ce4db3715ca548697625f391a3981e60d737589b883b41406717cc05a01885ab8be2", 0xaa, 0x1}, {&(0x7f0000000440)="b0ae74b4a35ed62578f30543d0333d8fe2cc7a49", 0x14, 0x1f}, {&(0x7f0000003ec0)="76f4eff10ceeac1161cb8f9bf6b336c9ee9e03f1105daccd83c4fc1c2529120e4d0237d9f128e7f6ec8a06bec0a08d526cc20d5d07097e4a416f8582210568c7faadea0ead6ee1f191964f499f6a36aa07e7780cfe3c0e36e02479", 0x5b, 0x100}, {&(0x7f0000003f40)="e459e6d4b0bb0ceeab928c28943ceead21ab25cd013b73ef64fb06bcf62d99b3ceac7b8882d591091eeec42190a8fdb001bb53bdee29c418df01f5cfaacd9c0b4e4e9272cbbbaae6b18a1367d90ae6c05beb6370325d0f29505a1a5d00205319db6c78c778c841671f6f7f339ef020a829943a", 0x73, 0x870}, {&(0x7f0000003fc0)="8baba533a6b392ea07e9d174877319a183bb3f8c5f00f58b624adbffa1688b0671baba85a9c2d1fba90ee1b69e1d6c2471544ea27f7698b1670e3f158b1e99e3e8053d0e08af202952fef18d8679cb577eb6d0874f99f02931c2ea43a8116d7471daf6e3", 0x64, 0x5}, {&(0x7f0000004040)="d213a87b52baa53975e38c55fd51011404465e5c6b49f14854b05a02430346d26c854579e1ffdfcec79bd894e4ed838f67db033c9704386a8ce75656205ffa66f9c6b20f6629b024da5421ddd97fc733c0ae0487cd0df042cde9498e2fd77d6a0b0cec78199bee3055d60207c3801ad180a130ae4bb391bb9b783058c2fb8ee14a5a2cc72f36a108938523229aa90312772881fd8449a76e2bceb1db00d343a315c918f8d1ea80dfc398251cd12c4ceeb5a53765a1a651ea7a7fd55ad849414d3201d8f5199f1e8d27ecd4ee9ac9f7c252124366d69a9647df451894f9899f67da9dc760", 0xe4, 0x3}, {&(0x7f00000004c0)="35cbb534598d8ad649a16b2e64453cf3f7c64faab6ef867945aa0353a7712d5a", 0x20, 0x34dd30d1}], 0x1000000, &(0x7f00000042c0)={[{@nls={'nls', 0x3d, 'macromanian'}}, {@umask={'umask', 0x3d, 0xffffffffffff8001}}, {@gid={'gid', 0x3d, r6}}, {@disable_sparse_yes='disable_sparse=yes'}], [{@fsmagic={'fsmagic', 0x3d, 0x8000}}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}]}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="48010c00daffffff060000000001000000000000000000000000000000000300000000200000020000000500000005000000000000000009000000000000000300000000000000d3000000000000000000610000000e0003000000000000000200000001000000163600000000000000000000000000a83afb39f2000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="f80000000700000000000000000000000000000000000000000008000600000009000000766d6e657430000006000000000000000000000000000000faffffffffffffff0000000000000000b7f00000c66700000200000000000000ffffff7f000000000300000000000000090000000000000000000000000000000400000000000000ff7f000001040000018000000600000000000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="a1f2ffff000800000000000003000000000000007f000000000000000000000008000000"], 0x148) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0], 0x2}}, 0x0) 14:07:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0], 0x2}}, 0x0) 14:07:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = getpid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)=0x0) setpgid(r9, r10) perf_event_open(0x0, r9, 0x4, r8, 0x102) setpgid(r9, r6) perf_event_open(0x0, r5, 0x4, r4, 0x102) rt_sigaction(0x0, &(0x7f00000002c0)={&(0x7f00000001c0)="f081859b506d0b0000000067660f01d8262e0fe22a3e45dbe1c40151efec66450f3a08c0006446f77f00c4a145df9f9e00000065f3440f2da07a000000c441796ea700000100", {0x7fffffff}, 0x20000001, &(0x7f0000000240)="c441fd297e0047d840ae0f1527f3ebe2c4c369021b88db846f633700008fe978c29edf000000f3470f5bb200000000f24d0faef5f20f2a9938000000"}, &(0x7f00000003c0)={&(0x7f0000000340)="3665660f3825c0c4c2e1bedc470f908db600000045da7b2cc4e2edbe246e0f380a08f634f90f60a2f90000008fa878c14e0200f26e", {}, 0x0, &(0x7f0000000380)="c4427991acdc00000080440f01fc720047de133645838d00000000fe660f380a2af241ff02c421b3590166420f383f023e44da02"}, 0x8, &(0x7f0000000400)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={[], 0xffffffff, 0xffffffffffffff8c, 0x8, 0x2, 0x9000000000000000, r5}) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r11 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x802, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r11, 0x0, 0x2d, &(0x7f0000000080)={0x40, {{0x2, 0x4e22, @remote}}}, 0x88) listen(r0, 0x1a0) 14:07:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0], 0x2}}, 0x0) 14:07:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:29 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) listen(r0, 0x1a0) 14:07:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) [ 2040.777653][ T8780] device bridge_slave_1 left promiscuous mode [ 2040.783870][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2040.837608][ T8780] device bridge_slave_0 left promiscuous mode [ 2040.843876][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state 14:07:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) [ 2042.857047][ T8780] device hsr_slave_0 left promiscuous mode [ 2042.896655][ T8780] device hsr_slave_1 left promiscuous mode [ 2042.964740][ T8780] team0 (unregistering): Port device team_slave_1 removed [ 2042.978153][ T8780] team0 (unregistering): Port device team_slave_0 removed [ 2042.990489][ T8780] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2043.041390][ T8780] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2043.131989][ T8780] bond0 (unregistering): Released all slaves [ 2043.227365][T12901] IPVS: ftp: loaded support on port[0] = 21 [ 2043.297595][T12901] chnl_net:caif_netlink_parms(): no params data found [ 2043.333554][T12901] bridge0: port 1(bridge_slave_0) entered blocking state [ 2043.340840][T12901] bridge0: port 1(bridge_slave_0) entered disabled state [ 2043.349084][T12901] device bridge_slave_0 entered promiscuous mode [ 2043.356914][T12901] bridge0: port 2(bridge_slave_1) entered blocking state [ 2043.364034][T12901] bridge0: port 2(bridge_slave_1) entered disabled state [ 2043.371856][T12901] device bridge_slave_1 entered promiscuous mode [ 2043.394258][T12901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2043.405142][T12901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2043.467985][T12901] team0: Port device team_slave_0 added [ 2043.475281][T12901] team0: Port device team_slave_1 added [ 2043.539279][T12901] device hsr_slave_0 entered promiscuous mode [ 2043.576832][T12901] device hsr_slave_1 entered promiscuous mode [ 2043.626791][T12901] debugfs: Directory 'hsr0' with parent '/' already present! [ 2043.663284][T12901] bridge0: port 2(bridge_slave_1) entered blocking state [ 2043.670435][T12901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2043.677852][T12901] bridge0: port 1(bridge_slave_0) entered blocking state [ 2043.684908][T12901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2043.741824][T12901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2043.757617][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2043.766308][ T3508] bridge0: port 1(bridge_slave_0) entered disabled state [ 2043.775524][ T3508] bridge0: port 2(bridge_slave_1) entered disabled state [ 2043.790389][T12901] 8021q: adding VLAN 0 to HW filter on device team0 [ 2043.802622][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2043.812331][ T3508] bridge0: port 1(bridge_slave_0) entered blocking state [ 2043.819468][ T3508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2043.837235][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2043.845719][ T3508] bridge0: port 2(bridge_slave_1) entered blocking state [ 2043.852857][ T3508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2043.881583][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2043.891131][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2043.900224][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2043.911599][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2043.922596][T12901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2043.931740][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2043.955706][T12901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2044.102120][T12917] ntfs: (device loop1): parse_options(): Unrecognized mount option fsmagic. [ 2044.116638][T12917] ntfs: (device loop1): parse_options(): Unrecognized mount option dont_hash. [ 2044.125521][T12917] ntfs: (device loop1): parse_options(): Unrecognized mount option defcontext. [ 2044.167034][T12917] ntfs: (device loop1): parse_options(): Unrecognized mount option appraise_type. [ 2044.184426][T12917] ntfs: (device loop1): parse_options(): Unrecognized mount option . 14:07:34 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:34 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) listen(r1, 0x6) 14:07:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) sendmmsg$sock(r2, &(0x7f0000000400)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, {0x7, 0x4, 0x4, 0xfffffffffffffffc, 0x1f, 0xff}, 0x6}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000100)="f3f4472ec990964a6846f6f85ec32cf3d9f4cd564e1c6581ad45eec7561a6015ce850a848b332f1d0650bb6e4e32a80139a3fc6b41d071b769e3a4fa8bb374eef8d4f09c33bbc4d940d1d5dc4ec022f369fe98b78ee5239ef6b93b19f8b00db9a7f99aceb0a443e3feca3a06ec0bb0d7ccc1e5cc09c4acbb321cceacca5ee91ee994cecab04d21c8dfa83944ef62c0f3f83886eb98a5ac5b5c54093404eed3f46789ec7a8c5e25ab", 0xa8}, {&(0x7f00000001c0)="8458b18577d662900fad48bec262bdb3d8d600dc2be4301b929057c29c60377e83db98f1561bb3a7a998b4b519b0268c3e9785c995071d177e4001aa31820cfe85b19e51fe3fe0e34eb5b3f3d56a0738085c6022153c3617ce20cc96bf6440b3bcc1b9d7f0c602d073ed25511c40b801ed1cd0f00fd6004f4f506360ecd2e9c51bc0a013578bf6b2da", 0x89}, {&(0x7f0000000080)="973ca376c1", 0x5}, {&(0x7f0000000280)="6ca95d7e82b8b3614c3383b99c813cf08f4f23eef612852bc96067abf1c20acd1e7f9bb6568e7cfeeb2a6452e4dff242", 0x30}, {&(0x7f00000002c0)="fe0197a6333f6471fefcdcb07c34d0a432201699e919a93c6dca62b34a92c58780a370f448e03dc5bddd0394b8da9afa5b97394d8a01244920edca3a6b655c6b95e3bb0c2f38c2ce46ee1169085d1c503ccced81681c3c7b7d0b7704af08bfb2489cb56f500f65081d3520f9daedd97a06fe43", 0x73}, {&(0x7f0000000340)="9865", 0x2}, {&(0x7f0000000540)="4781d396773f96694e52a044a5f512275ad309d4996cc08617ebc3a7c9fbf5861a22e8e578ec94d9353b06fc7f85a34ff901ceb16e28d2eae25408884fd57fef014646d55a37200d34ac709ff0abacd8473542e9152838afa2b758f965503df7d36fccab8a1206be07c5241967e2372e24e4e3849752b786a8cf930f575f09b4effea7134df20472f4feac30192ca9ff3f08106db9f78935c7c3399020df4c2e85b1b6d8cc0f74f0875052fd4d36f87dd6a14267b524b35f34ce89b212a20b9e268822d832b1ea7c5ceb", 0xca}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000380)="33a55e0eb7100748086c7db8ef9b2fc0b9ee184aa121abc0caf8e7ad2b7b57e4d50ed9dff440cca5662596b258fa6ae4f3", 0x31}, {&(0x7f00000003c0)="8dc8dd5dc05aa6125d135ebb7e82a092309eef10a6e0b37e30f4484413e537600a1554820dd45080d314ff1ade2f13ad001aabe757307d4cb263ac7fce7167", 0x3f}], 0xa, &(0x7f0000001700)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4d3}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x48}}], 0x1, 0x7bd4af36f529f066) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xfffffffffffffffe) 14:07:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 14:07:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 14:07:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') clone(0x2000000022a20900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x81, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0302360}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="d8000001", @ANYRES16=0x0, @ANYBLOB="01002cbd7000fedbdf25080000001400020008000e004e230000080004000800000028000100080008000900000008000b00736970000c0007000800000010000000080004004e240000040002004c00010008000800030000000c00070004000000ab964942140003000000000000000000000000000000000108000b00736970000800090044000000080009004e00000008000600646800000800060005000000300003000800040003000000080003000100000014000200636169663000000000000000000000000800080002000000"], 0xd8}}, 0x40) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r2, 0xfffffffffffffffd) keyctl$describe(0x6, r2, 0x0, 0x0) request_key(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dh\x00', r2) r3 = getpid() syz_open_procfs$namespace(r3, &(0x7f0000000400)='ns/net\x00') tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000002c0)="4ea48f9f663be0edf728c4d9e6e25e1dff5a8192c097eff7eaf2e0f8a53d6e06b16519c2bfa49987847b0bc641562d2beaa8cb8b3d055051ab03da00891ff0aab489b6f865e7ac26fd964a6083a8bd32e1ac9dcc737723725814ab15bcbe080a1bf0e86a4752f527ad529dce4a694833d49936017344dbd2adf59dc37e805b992b45f7ebbbfd16") r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) write$binfmt_aout(r4, &(0x7f0000000540)={{0xcc, 0xffffffff, 0x0, 0x1dd, 0x12, 0x9a05, 0xad, 0x3}, "b69fdfef69b8ec31f630d3f994d2721072929762f150b7f87970bdfc36990fb8995b96eae92d026bbb859e8ac314075cc3250bce4f78c893b1b07f90b1ff65d6d95ba1492345f2f77aea151696e38685631a28d677314db86fbb46f3a80a5b9297d70c39367a524a55b1eeb06a4b082f3cd96f01f139dfca5a11079856bcde2084756de4481026f58e7e7d4201df58caac02ebaf35cf1578b6116bf3372838fda4b8d33805c051d900093c667d651f62acd947cb91d58da8c40bc47e08da44712e", [[], [], [], [], [], [], [], [], []]}, 0x9e1) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x4) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) gettid() ptrace$cont(0x9, r0, 0x0, 0x0) gettid() 14:07:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400120010000100697036657273"], 0x3}}, 0x0) 14:07:35 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) listen(r0, 0x1a0) 14:07:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000000)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x20599670, 0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) 14:07:35 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0xffffffff}, 0x28, 0x1) 14:07:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400120010000100697036657273"], 0x3}}, 0x0) 14:07:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000180)={0x1, 0xc, 0x4, 0x10000, {0x0, 0x7530}, {0x3, 0x0, 0x5, 0x5b, 0x1c000, 0x8, "6c2cd277"}, 0x8001, 0x8, @userptr=0x1ff, 0x4}) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000100)={0x3f, 0x8, 0x4, 0x1, {}, {0x2, 0x0, 0x1ff, 0x9, 0x4, 0x6, "e4f892fa"}, 0x7ff, 0xe, @fd, 0xfffffffffffffee5}) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:35 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='md5sumlo#selinuxproc[trusted\x00'}, 0x10) listen(r0, 0x1a0) 14:07:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000040)=0xc16) 14:07:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400120010000100697036657273"], 0x3}}, 0x0) 14:07:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:36 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8480, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x5, 0x3, 0x5, 0x1, 0x7}) r1 = socket$rxrpc(0x21, 0x2, 0x6b1bfa31942c5864) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) getsockopt$XDP_STATISTICS(r3, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) listen(r1, 0x0) listen(r1, 0x1a0) 14:07:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004"], 0x3}}, 0x0) 14:07:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:36 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004"], 0x3}}, 0x0) 14:07:36 executing program 3: 14:07:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x14) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:38 executing program 3: 14:07:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400481, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000040)={0x2, 0x2e, "10100432dba32f4662e3b44cf7ef81ff61fb16ef01130b0fb85056c8ccac651acd9720c8c9c068055c1abb146700"}) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004"], 0x3}}, 0x0) 14:07:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:38 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:38 executing program 3: 14:07:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080004"], 0x3}}, 0x0) 14:07:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:39 executing program 3: 14:07:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:39 executing program 3: 14:07:41 executing program 3: 14:07:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080004"], 0x3}}, 0x0) 14:07:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x19, 0x0, @thr={&(0x7f0000000000)="017d175da60a4e7297b8c1d7893c2952e410864a5e3f7e08c324053de906779175ea44cc8dab5031f8c4a8613a0c183dcc6c4a300a1b9745fbde52a0f1a4fc52e7c295fe1d4f8bd3993c1b35273bdba6f38743614269b1044e453798ac171da18e7da73f618378915c8f4ef09ffbb48858c03cd1175c7c55e8156a6e29b6f43fc296b632e0", &(0x7f0000000100)="0763a986c67af24190cd85b685329c65596f9674b06630ba06dab54b8cf9117b41e6805c6184673b5b33b23a814dc0344d4639417b11be6e10176d4f00d9528f2f133cf0cdd1269d847d8c7d3e1694a29a4b29da7a0423fa9411aa7a92f41d982e882f9e3b365f7525a3d3212535920f5da06ade1e1db4b5a16af212dc0175016606aa40d1de50ba77"}}, &(0x7f0000000200)) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10201, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000000)={0x6, 0x4, 0x7f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xd}, 'veth1_to_bridge\x00'}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) perf_event_open(0x0, r5, 0x4, r4, 0x102) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080004"], 0x3}}, 0x0) 14:07:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080004000300"], 0x3}}, 0x0) 14:07:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 2051.456749][T13483] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 14:07:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000340)={{0x2, 0x4e21, @rand_addr=0x37}, {0x781, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}, 'veth0_to_bridge\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000200)={r2, r4, 0x0, 0xcb, &(0x7f0000000100)="8f2674ae35deeabd23dbf93c31f774c0dba57fbed64774e219dd0d5c36a6b3ab83c2ef1ad410b634680f2c97f8fd91c6c3c0514a74179b020c6f62f8c27e5d6a336a3029ec2f19ab396b5d820e79389db66508b77fe9acfc4f9dc6288eb3b08633a9a92a56c09d66c24cfbb70330bfd1ad155fcd976077f3186883dd151e334dec32132e71133ab650d404a97473489a36217a9286b933b3c22c3b08b78074ea43eb4c211fe35d1337006c729719ceccbc21536ffa77ce44aabc7963e936a120d484db2e1113cfe9c98378", 0x49, 0xfffffffffffff000, 0x8, 0x7, 0xfffffffffffffbe8, 0x3, 0xfff, 'syz0\x00'}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080004000300"], 0x3}}, 0x0) 14:07:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 2051.785882][T13518] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 14:07:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) 14:07:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e0000001000020004001200080004000300"], 0x3}}, 0x0) 14:07:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:07:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000092140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getpid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) setpgid(r3, r0) fcntl$setown(r1, 0x8, r3) r8 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='GPL\'ppp0,])\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)="502885c04e9b95704a27ee25aab65d0cb5110e9cfe030438fd57b5ad2d2037b1325c515bd74371da7d87cf954f4d38f0bc3a42c894cfa02ac41556b25af8bb9c6ba68a7ed513d0656d8f710a0c478da63e432152e37f7e4f1207d9f17f191f46d2cd71457b0661a0bc64c59cbfbe0fa3dfa2042fb2446abc7b8b42a22a57418d7c71c88584f39a75cad51ea0ecb63a842f7847bfb806697d5f49322cf396e516b0fa", 0xa2, r8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2054.550786][T13534] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 14:07:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000100)=0x1) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r3, 0x0, 0x7ffff000) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f0000000000)={0x4, 0x101, 0x83, 0x5e2, 0x6, 0x3}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) tkill(r6, 0x1) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) getsockopt$TIPC_NODE_RECVQ_DEPTH(r9, 0x10f, 0x83, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendto$inet(r8, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r10 = gettid() r11 = syz_open_procfs(r10, &(0x7f0000000040)='net/udp\x00') sendfile(r8, r11, 0x0, 0x7ffff000) ioctl$EVIOCGBITSW(r11, 0x80404525, &(0x7f0000000540)=""/4096) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) inotify_init1(0x800) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e000000100002000400120008000400030000"], 0x3}}, 0x0) 14:07:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:07:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e000000100002000400120008000400030000"], 0x3}}, 0x0) [ 2054.733862][T13555] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 14:07:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) dup3(r1, r3, 0x100000) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f0000000000)={0x0, @remote}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getpriority(0x1, r0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000040)={0x0, 0x8, 0x0, 0xe61acce97247aa0c, &(0x7f0000ffc000/0x3000)=nil, 0x7f}) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000000, 0x80000) vmsplice(r3, &(0x7f00000000c0), 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) tkill(r6, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:07:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:48 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e000000100002000400120008000400030000"], 0x3}}, 0x0) 14:07:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea", 0x53}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:07:48 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x2}}, 0x0) 14:07:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4200, r0, 0x800000000000000, 0x100024) mmap(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x1000002, 0x2010, 0xffffffffffffffff, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) r4 = gettid() ptrace$cont(0x7, r4, 0x80000000, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:48 executing program 4: socket$packet(0x11, 0x4000000000000a, 0x300) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@remote, @local, [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast1}, @icmp=@echo}}}}, 0x0) 14:07:48 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x2}}, 0x0) 14:07:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r3, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) sched_getscheduler(r3) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r6 = getpgrp(0xffffffffffffffff) write$cgroup_pid(r5, &(0x7f0000000040)=r6, 0x12) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x69, 0x105800) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000002}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r2, 0xc93e1afeeb4ae0fa, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xd3b2ad81d90d561}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x400e098) 14:07:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000380)={0x81, 0x4, [0xfc, 0x2, 0xb6df462, 0x8, 0x200], 0xfffffffffffff5a4}) fdatasync(r1) r3 = socket(0x2, 0x1, 0x9) clock_nanosleep(0x6, 0x1, 0x0, 0x0) dup3(r2, r3, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) fdatasync(r1) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, &(0x7f0000000140)) ptrace$peekuser(0x3, 0x0, 0x80000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000003da811aa"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="200029bd7000fedbdf250e0000001c000200040004000400040008000100030000000800010000f8ff035c0007000c000300fdffffffffffffff08000200030000000c0004009d0000000000000008000200020000000c001100ff0f00000000000008000100000200000c00040007000000000000000800020003000000080002000000000040000200080002000010000004000400080001003cf7ffff04000400080001000200000004000400080002000600080001000700000014000100100001007564703a7379fb44b11600004400020008000100010000000400040008000200010100000400040008000200010000000800020007000000080001007f00000008000200000000000800020003000000640007000cc635fad3000000000000000c000300ffffff7f000000000c000300060000000000d1613afb812a2f93b9c88d2a32e857df4ce6e856c05c316a229a9a4119e63a23ce0cf8d364856945d1a6e9ca264e54afdc44b31194f47bffe91689244f054d7de3d1756276a36dd768c8b224377ee7a88a7ad9acf076ae35983d0422d4c583901613842499f69edeb63f"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:07:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d0000", @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x2}}, 0x0) 14:07:48 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000100)="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") ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x2}}, 0x0) 14:07:49 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x2}}, 0x0) 14:07:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:49 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:07:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x2}}, 0x0) 14:07:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000380)={0x81, 0x4, [0xfc, 0x2, 0xb6df462, 0x8, 0x200], 0xfffffffffffff5a4}) fdatasync(r1) r3 = socket(0x2, 0x1, 0x9) clock_nanosleep(0x6, 0x1, 0x0, 0x0) dup3(r2, r3, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) fdatasync(r1) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, &(0x7f0000000140)) ptrace$peekuser(0x3, 0x0, 0x80000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000003da811aa"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:07:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14:07:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:07:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:07:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14:07:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000012808100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x40280) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x76, &(0x7f00000000c0)={r4}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r4, &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)=ANY=[@ANYRES32=r5, @ANYBLOB="085c5a874d73d9c5d9212fffca946e2aab221c9a98a03a6e24e6a26a9dbee4e230aa99b8706c372af3787960e2821eee5891c6ab4e12293787cd98ff5a70b195926b3f81"], &(0x7f00000002c0)=0xa) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$KVM_SET_IRQCHIP(r6, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x80000001, 0x705, 0x0, 0x1, 0x6, 0xfffffffffffffffd, 0xa30, 0x7, 0x101, 0x3, 0x4, 0x7, 0x800, 0x240000, 0x3, 0x9}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r8, 0x0, 0x7ffff000) chmod(&(0x7f0000000000)='./file0\x00', 0x80) setsockopt$TIPC_IMPORTANCE(r8, 0x10f, 0x7f, &(0x7f0000000040)=0xe8, 0x4) 14:07:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000000)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x38) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r8, 0x0, 0x7ffff000) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000180)=0xb) r9 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r9, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r9, r10, 0x0, 0x7ffff000) ioctl$KVM_CHECK_EXTENSION(r10, 0xae03, 0x0) ptrace$cont(0x9, r6, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$TIPC_GROUP_JOIN(r11, 0x10f, 0x87, &(0x7f0000000100), &(0x7f0000000140)=0x4) 14:07:52 executing program 1: r0 = getpgid(0x0) rt_sigqueueinfo(r0, 0x36, &(0x7f0000000040)={0x3e, 0xb190, 0x7}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) perf_event_open(0x0, r4, 0x4, r3, 0x102) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000100)={{0x1, 0x2, 0x3, 0x2, '\x00', 0x5}, 0x5, 0x10, 0x1, r4, 0x1, 0x2, 'syz0\x00', &(0x7f0000000000)=['mime_type\xa2security(vboxnet1trustedem0ppp1/mime_type\x00'], 0x34, [], [0x5, 0x6, 0x1, 0x100]}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:07:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:07:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 2061.519975][T14103] ptrace attach of "/root/syz-executor.0"[14101] was attempted by "/root/syz-executor.0"[14103] 14:07:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000380)={0x81, 0x4, [0xfc, 0x2, 0xb6df462, 0x8, 0x200], 0xfffffffffffff5a4}) fdatasync(r1) r3 = socket(0x2, 0x1, 0x9) clock_nanosleep(0x6, 0x1, 0x0, 0x0) dup3(r2, r3, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) fdatasync(r1) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, &(0x7f0000000140)) ptrace$peekuser(0x3, 0x0, 0x80000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000003da811aa"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:07:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:07:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 14:07:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='nr0\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) setpgid(r2, r3) perf_event_open(0x0, r2, 0x4, r1, 0x102) r4 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff6920, 0x200) r5 = getpgid(0x0) ptrace$getsig(0x4202, r5, 0x340f, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000004300)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf2516000000201072000c008d006f0000000000000008004000", @ANYRES32=r5, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="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"/588, @ANYRES32=r5, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r5, @ANYBLOB="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"], 0x9}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0xd7f7d4a, 0x9, &(0x7f0000004140)=[{&(0x7f0000000380)="e384e770e0210417e986e5a6f5f5eeea5e4ff1a3128bbff84e67351d730bbf6ac4bba6f326c14109cf47b11ef40d232159abd69b46b0d7", 0x37, 0x8}, {&(0x7f0000000400)="3dc782782f71b06e6ffc7cdec6ab30", 0xf, 0x7fffffff}, {&(0x7f0000003e00)="33828a2685746150fcf1a2b78f16c2ac7c48441de78d3b72e954a6f32ceb824af020944a88b37551b45e269aefa69ae3d987d4da1c44f451c931d22009d2add13681b579a9b7aad3313ad01009117e51aab64d83a51ca04db07f317ecd6e184c85f4341d647e683f414404e330aff28705ce2f3af3765ae3bede025702368c8d98add26d662b2cc8ce4db3715ca548697625f391a3981e60d737589b883b41406717cc05a01885ab8be2", 0xaa, 0x1}, {&(0x7f0000000440)="b0ae74b4a35ed62578f30543d0333d8fe2cc7a49", 0x14, 0x1f}, {&(0x7f0000003ec0)="76f4eff10ceeac1161cb8f9bf6b336c9ee9e03f1105daccd83c4fc1c2529120e4d0237d9f128e7f6ec8a06bec0a08d526cc20d5d07097e4a416f8582210568c7faadea0ead6ee1f191964f499f6a36aa07e7780cfe3c0e36e02479", 0x5b, 0x100}, {&(0x7f0000003f40)="e459e6d4b0bb0ceeab928c28943ceead21ab25cd013b73ef64fb06bcf62d99b3ceac7b8882d591091eeec42190a8fdb001bb53bdee29c418df01f5cfaacd9c0b4e4e9272cbbbaae6b18a1367d90ae6c05beb6370325d0f29505a1a5d00205319db6c78c778c841671f6f7f339ef020a829943a", 0x73, 0x870}, {&(0x7f0000003fc0)="8baba533a6b392ea07e9d174877319a183bb3f8c5f00f58b624adbffa1688b0671baba85a9c2d1fba90ee1b69e1d6c2471544ea27f7698b1670e3f158b1e99e3e8053d0e08af202952fef18d8679cb577eb6d0874f99f02931c2ea43a8116d7471daf6e3", 0x64, 0x5}, {&(0x7f0000004040)="d213a87b52baa53975e38c55fd51011404465e5c6b49f14854b05a02430346d26c854579e1ffdfcec79bd894e4ed838f67db033c9704386a8ce75656205ffa66f9c6b20f6629b024da5421ddd97fc733c0ae0487cd0df042cde9498e2fd77d6a0b0cec78199bee3055d60207c3801ad180a130ae4bb391bb9b783058c2fb8ee14a5a2cc72f36a108938523229aa90312772881fd8449a76e2bceb1db00d343a315c918f8d1ea80dfc398251cd12c4ceeb5a53765a1a651ea7a7fd55ad849414d3201d8f5199f1e8d27ecd4ee9ac9f7c252124366d69a9647df451894f9899f67da9dc760", 0xe4, 0x3}, {&(0x7f00000004c0)="35cbb534598d8ad649a16b2e64453cf3f7c64faab6ef867945aa0353a7712d5a", 0x20, 0x34dd30d1}], 0x1000000, &(0x7f00000042c0)={[{@nls={'nls', 0x3d, 'macromanian'}}, {@umask={'umask', 0x3d, 0xffffffffffff8001}}, {@gid={'gid', 0x3d, r7}}, {@disable_sparse_yes='disable_sparse=yes'}], [{@fsmagic={'fsmagic', 0x3d, 0x8000}}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}]}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={r2, r6, r7}, 0xc) 14:07:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') semctl$SETVAL(0x0, 0x4, 0x10, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r4, 0x1, 0x0, 0x0, {{}, 0x0, 0xb, 0x0, {0x97, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3f}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x149c8}, 0x4010) sendfile(r1, r2, 0x0, 0x7ffff000) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r7, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r7, r8, 0x0, 0x7ffff000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0x9, @rand_addr="6363553115135cae7b9b19b6ee82ebfb", 0x9}}, 0x3b, 0x4, 0x3fef, 0x1, 0x3}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000340)={r9, 0x9, 0x4, 0x8, 0x0, 0x5}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x76, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={r10, 0x3}, &(0x7f0000000040)=0x8) ptrace$cont(0x9, r0, 0x0, 0x0) 14:07:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 14:07:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:07:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/165, 0xc2) [ 2062.212461][T14130] ntfs: (device loop1): parse_options(): Unrecognized mount option fsmagic. [ 2062.236742][T14130] ntfs: (device loop1): parse_options(): Unrecognized mount option dont_hash. [ 2062.260312][T14130] ntfs: (device loop1): parse_options(): Unrecognized mount option defcontext. [ 2062.312924][T14130] ntfs: (device loop1): parse_options(): Unrecognized mount option appraise_type. 14:07:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:07:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 2062.353118][T14130] ntfs: (device loop1): parse_options(): Unrecognized mount option . 14:07:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000380)={0x81, 0x4, [0xfc, 0x2, 0xb6df462, 0x8, 0x200], 0xfffffffffffff5a4}) fdatasync(r1) r3 = socket(0x2, 0x1, 0x9) clock_nanosleep(0x6, 0x1, 0x0, 0x0) dup3(r2, r3, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) fdatasync(r1) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, &(0x7f0000000140)) ptrace$peekuser(0x3, 0x0, 0x80000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000003da811aa"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:07:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:07:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0), 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:07:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000800000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000800000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:08:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0), 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:08:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000380)={0x81, 0x4, [0xfc, 0x2, 0xb6df462, 0x8, 0x200], 0xfffffffffffff5a4}) fdatasync(r1) r3 = socket(0x2, 0x1, 0x9) clock_nanosleep(0x6, 0x1, 0x0, 0x0) dup3(r2, r3, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) fdatasync(r1) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, &(0x7f0000000140)) ptrace$peekuser(0x3, 0x0, 0x80000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000003da811aa"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:08:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r3, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) ptrace$setopts(0x4206, r3, 0x9, 0x1) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:08:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f0000000000)={0x9, "48f7297b3c8596256e4c2651dd291f32b5af4806c4405e2ceb9dbbe0cc17e821", 0x2, 0x2}) 14:08:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="440000001000010600000800000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:08:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0), 0x4) read(r0, &(0x7f0000000140)=""/165, 0xc2) 14:08:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:08:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000380)={0x81, 0x4, [0xfc, 0x2, 0xb6df462, 0x8, 0x200], 0xfffffffffffff5a4}) fdatasync(r1) r3 = socket(0x2, 0x1, 0x9) clock_nanosleep(0x6, 0x1, 0x0, 0x0) dup3(r2, r3, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) fdatasync(r1) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, &(0x7f0000000140)) ptrace$peekuser(0x3, 0x0, 0x80000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000003da811aa"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:08:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) 14:08:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0xb, @rand_addr="b47130648305837ea3257a65562c287b"}]}}}]}, 0x48}}, 0x0) [ 2125.137674][ T8780] device bridge_slave_1 left promiscuous mode [ 2125.143916][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2125.197640][ T8780] device bridge_slave_0 left promiscuous mode [ 2125.203904][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2127.127293][ T8780] device hsr_slave_0 left promiscuous mode [ 2127.166725][ T8780] device hsr_slave_1 left promiscuous mode [ 2127.225750][ T8780] team0 (unregistering): Port device team_slave_1 removed [ 2127.239272][ T8780] team0 (unregistering): Port device team_slave_0 removed [ 2127.250579][ T8780] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2127.291466][ T8780] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2127.381489][ T8780] bond0 (unregistering): Released all slaves [ 2127.526059][T14741] IPVS: ftp: loaded support on port[0] = 21 [ 2127.597620][T14741] chnl_net:caif_netlink_parms(): no params data found [ 2127.679215][T14741] bridge0: port 1(bridge_slave_0) entered blocking state [ 2127.686923][T14741] bridge0: port 1(bridge_slave_0) entered disabled state [ 2127.701546][T14741] device bridge_slave_0 entered promiscuous mode [ 2127.711041][T14741] bridge0: port 2(bridge_slave_1) entered blocking state [ 2127.724075][T14741] bridge0: port 2(bridge_slave_1) entered disabled state [ 2127.733707][T14741] device bridge_slave_1 entered promiscuous mode [ 2127.771581][T14741] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2127.791815][T14741] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2127.815641][T14741] team0: Port device team_slave_0 added [ 2127.824321][T14741] team0: Port device team_slave_1 added [ 2127.889342][T14741] device hsr_slave_0 entered promiscuous mode [ 2127.956786][T14741] device hsr_slave_1 entered promiscuous mode [ 2127.996511][T14741] debugfs: Directory 'hsr0' with parent '/' already present! [ 2128.022094][T14741] bridge0: port 2(bridge_slave_1) entered blocking state [ 2128.029237][T14741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2128.036643][T14741] bridge0: port 1(bridge_slave_0) entered blocking state [ 2128.043699][T14741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2128.118820][T14741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2128.141481][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2128.154964][ T9911] bridge0: port 1(bridge_slave_0) entered disabled state [ 2128.175876][ T9911] bridge0: port 2(bridge_slave_1) entered disabled state [ 2128.201277][T14741] 8021q: adding VLAN 0 to HW filter on device team0 [ 2128.220286][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2128.235847][ T9911] bridge0: port 1(bridge_slave_0) entered blocking state [ 2128.242978][ T9911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2128.273595][T12513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2128.284731][T12513] bridge0: port 2(bridge_slave_1) entered blocking state [ 2128.291850][T12513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2128.324704][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2128.334314][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2128.350315][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2128.371494][T14741] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2128.390224][T14741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2128.401901][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2128.414151][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2128.438416][T14741] 8021q: adding VLAN 0 to HW filter on device batadv0 14:08:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)) perf_event_open(0x0, r3, 0x4, r2, 0x102) ptrace$cont(0x1f, r3, 0x1, 0x9) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) setsockopt$inet_sctp_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000000)=0x2, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:08:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d00", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000380)={0x81, 0x4, [0xfc, 0x2, 0xb6df462, 0x8, 0x200], 0xfffffffffffff5a4}) fdatasync(r1) r3 = socket(0x2, 0x1, 0x9) clock_nanosleep(0x6, 0x1, 0x0, 0x0) dup3(r2, r3, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) fdatasync(r1) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, &(0x7f0000000140)) ptrace$peekuser(0x3, 0x0, 0x80000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000003da811aa"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:08:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x501}, 0x20}}, 0x0) 14:08:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0xc2) 14:08:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x20000, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:08:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d00", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x501}, 0x20}}, 0x0) 14:08:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xd6}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:08:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0xc2) 14:08:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000000100001060000080000000000000d00", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012001000010069703665727370616e00000010000200040012000800040003000000"], 0x3}}, 0x0) 14:08:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000003c0)=""/8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000380)={0x81, 0x4, [0xfc, 0x2, 0xb6df462, 0x8, 0x200], 0xfffffffffffff5a4}) fdatasync(r1) r3 = socket(0x2, 0x1, 0x9) clock_nanosleep(0x6, 0x1, 0x0, 0x0) dup3(r2, r3, 0x80000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fcntl$getown(r4, 0x9) fdatasync(r1) flistxattr(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, &(0x7f0000000140)) ptrace$peekuser(0x3, 0x0, 0x80000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000005d00000000000000950000003da811aa"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:09:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0xc2) 14:09:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x501}, 0x20}}, 0x0) 14:09:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) syz_open_dev$evdev(0x0, 0x0, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x10000001}, {}], 0xff91) 14:09:02 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) write$evdev(r0, &(0x7f000004d000)=[{}, {}], 0xff91) 14:09:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x4}}}]}, 0x34}}, 0x0) 14:09:02 executing program 1: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x252104) getpgrp(0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) perf_event_open(0x0, r2, 0x4, r1, 0x102) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = getpid() ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000280)=0x0) setpgid(r10, r11) perf_event_open(0x0, r10, 0x4, r9, 0x102) r12 = socket$inet_tcp(0x2, 0x1, 0x0) r13 = getpid() ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000280)=0x0) setpgid(r13, r14) r15 = socket$inet_tcp(0x2, 0x1, 0x0) r16 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = getpid() ioctl$sock_SIOCGPGRP(r15, 0x8904, &(0x7f0000000280)=0x0) setpgid(r17, r18) perf_event_open(0x0, r17, 0x4, r16, 0x102) r19 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r19, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r20 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r21 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(0xffffffffffffffff, r21, 0x0, 0x7ffff000) sendfile(r19, r21, 0x0, 0x7ffff004) ioctl$sock_FIOGETOWN(r20, 0x8903, &(0x7f0000000040)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r22) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r23 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r23, 0x0, 0x0) tkill(r23, 0x38) ptrace$cont(0x18, r23, 0x0, 0x0) ptrace$setregs(0xd, r23, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r23, 0x0, 0x0) 14:09:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, 0x0, 0x0) 14:09:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x4}}}]}, 0x34}}, 0x0) 14:09:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x2001) io_setup(0x1000, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000001b00)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 14:09:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000000)={0x7, [0x8001, 0xb769, 0x6, 0x8, 0xfffffffffffff08e, 0x3, 0x0]}, &(0x7f0000000040)=0x12) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0xfffffffffffffffc, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x488000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') r5 = socket(0x11, 0x3, 0xfffffffffffffc01) recvfrom$unix(r5, &(0x7f0000000240), 0x0, 0x40012003, 0x0, 0x713) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1}, &(0x7f0000000340)=0xc) setsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000001c0)={@loopback, r7}, 0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x52002018}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="c1796db3d8108b1b98004400", @ANYRES16=r4, @ANYBLOB="850f2bbd7000fbdbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="7c000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000008000300030000000800040000010000"], 0x98}, 0x1, 0x0, 0x0, 0x20000030}, 0x0) [ 2132.080120][T15205] ptrace attach of "/root/syz-executor.1"[15105] was attempted by "/root/syz-executor.1"[15205] 14:09:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @remote}}}, &(0x7f0000000100)=0x84) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:09:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x4}}}]}, 0x34}}, 0x0) 14:09:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, 0x0, 0x0) 14:09:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:09:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5510700bfa30000000000001503000028feffff720af0fff8ffffff71a4f0ff00000000b706000001edff9fad400200000000000406000001ed000071183600000000002d640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000040000000000000079fc9e94af69912461917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf11efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaeba9d940a891b2a0cefc646cb77900000000000000"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 14:09:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:09:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x4, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0xff93) connect$inet6(r1, &(0x7f0000000280), 0x1c) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 14:09:03 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, 0x0, 0x0) 14:09:03 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) dup2(r0, r1) 14:09:03 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r0, &(0x7f0000000200)=ANY=[], 0x5aa78d33) fallocate(r0, 0x10000000000010, 0x0, 0x10fffe) fsync(r0) 14:09:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x30, 0x0, 0x31c, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0xfe3a}}}, 0x30}}, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r1, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r3, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r3, 0x0, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}}, 0x2010000) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r4 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000002bc0)=[{0xff03, 0x0, &(0x7f0000001200)=[{&(0x7f0000000080)="96b5103452b3e5c9ba2461b44cf3f47615523e87e7d37b32d459b0c6feb6c793dbdfb77a3039878a1c1ebd27a01603318c80de78a675b3353886802d0450d75755245c072ea57e66c785a62c47e91eaad925983507d278d20dc5c491ccad10fb6e7fadccbdea00509ae15d8567314f6dc0bd463e0d70114467568d680183b110fb93433fbb99adac55ad2200c8529527da132dafafac8e838c964aeca31f88d6482c3d115790bb6d3d279d3556f8db66947a67a0e61abcd14325", 0xba}], 0x1, 0x0, 0x0, 0x40}], 0x1, 0x0) 14:09:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006580)=[{{&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, 0x0}}, {{&(0x7f0000002c00)={0x2, 0x4e1f, @remote}, 0x10, 0x0, 0x0, &(0x7f0000002e40)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x18}}], 0x2, 0x0) socket$inet(0x2b, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x9eb8}, 0x0) 14:09:05 executing program 2: syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0xe200000000000000, 0x1, &(0x7f00000016c0)=[{&(0x7f00000006c0)="58465342b313a3612bcf8571dedf0b5083c622d543bb9902ca6cd43744a5", 0x1e, 0x48}], 0x0, 0x0) 14:09:05 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000140)='.\x00', 0x1000000a6) dup2(r0, r1) [ 2135.314573][T15886] XFS (loop2): Invalid superblock magic number 14:09:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) ptrace$setopts(0x4200, 0x0, 0x7fff, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x80000000, &(0x7f0000000100)="69ecd1eb1f62e5e65d1e6333c48ac5d8f26c3bad2bb0b92cc334617cd3be8246d305c3f3086e3659d165277869b9679804dbeb3fa4439994103206a03548445ec2dca306a5ec103cef33f2ac9975f8076716b08c30fc48317372aad4e8c841b9031c59610100d4f90e661903078e23b1075c5bd0c6f3bbf3de5002a5d76c") r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) ptrace$cont(0x9, r6, 0xfffffffffffffffd, 0x0) 14:09:06 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x14, 0x4, 0x200000004, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0x5f]}, 0x3c) 14:09:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:09:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000000)) 14:09:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) setpgid(r3, r4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r8, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r8, r9, 0x0, 0x7ffff000) fcntl$getownex(r9, 0x10, &(0x7f0000001980)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = getpid() ioctl$sock_SIOCGPGRP(r10, 0x8904, &(0x7f0000000280)=0x0) setpgid(r11, r12) r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = getpid() ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000280)=0x0) setpgid(r14, r15) r16 = socket$inet_tcp(0x2, 0x1, 0x0) r17 = getpid() ioctl$sock_SIOCGPGRP(r16, 0x8904, &(0x7f0000000280)=0x0) setpgid(r17, r18) prctl$PR_SET_PTRACER(0x59616d61, r18) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000400)={0x2, 0x80000001}) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r19 = gettid() wait4(r19, 0x0, 0x1000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r19, 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0xcf5, 0x9, &(0x7f0000001880)=[{&(0x7f0000000140)="8af2ec", 0x3, 0x101}, {&(0x7f0000000180)="317527b046ead12604259e90593fc30a64ec47b4b01f3c35471c7e933215b1bf2b138b0ab1c70d7dcc9cdc66f954f71a6787011408a86803e9a4b5ab3fb0c41f34c51fb0c53f9aa6a7ff0d5d364ca8c11aa43f5661d00b2d87e950ba0886c6b9b122fcfb71a2f06108e349f70bda24b866f0fd2e465f3c466cd5374978463e8a2bee66567d2e4847ddc03ccaabf416829a879643dbbc2533bc", 0x99, 0x227}, {&(0x7f0000000240), 0x0, 0x4}, {&(0x7f0000000340)="fe8cb46ddfcc3d35f0d55381ed4786db695befd86a01946163927783efcf5fb00f6a50c97a4d2e38978005cbe432f8a828311d66d0e8e236a764011da519b8a1e010175414630a38e7f8f5aa5a591b6df2acf91dba0f0d03e0f66bb26e1ee7bec215528ab1891f419cb0ef4b66d823d7bae8c6642d339b4580c4668dc0becf1170548471dadd49788325cacc6e54036894", 0x91, 0x3ff}, {&(0x7f0000000540)="9af2ae18142363879a901d02d2ff6e0955a0d9649b58b90ccaa71203d902302d89aacce87aa262030a2f0eb745a13d6de44ae3202eae941a27bdb55d65924c6216a1cdd4cb894718ba9190f0e2703adfde8a965711a1dd9d7409a1c432ba0717bf193111877d230cee799ebb7b8ebe7b3afc0efd17e6f8eba014d8f7f01f3a3f670f48db637727116e22897f06e049fbfdafd187c5f3e25a41a381d68a9877e9ce071f854c4f476a299c35db6f5cb4a9e7675c096a0b161c483874788a319aa6e1756245fdb18cdc219ff614a81cb7cea703a97aed31", 0xd6, 0x7}, {&(0x7f0000000640)="05a05f6b7d1858c6e7f8668502e181c6f3a453d6b860de6117118591f98eb5d9d9c6ddb88f1ddd160fa19eb751207e94fee08c270bf5dd5be05c7ad89e2a4e77faafb4f327c6dd8a3ae9124c8db276f021b6e14dc5e01404f8369518bcee3acad1acef34f1c7b0bc0b148d6f", 0x6c, 0x5}, {&(0x7f00000006c0)="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", 0x1000, 0x5}, {&(0x7f00000016c0)="32068d45e8177b39b5c92cc61d7503358f47a51a067bf6bf68aec679714c6e5164090c7e33f0f92e7a88f793f9eaf65964e376f94b4f6097f9354fdd41cc28846daf624a33ae66670901e959315643172857f7c3dae9b56dd8780310c1ead2f0956ddd0756e875caadc78e46a20f3390f0fb8bd016cc95507159ff20c681a4e0e327", 0x82, 0x9}, {&(0x7f0000001780)="823b5177a5aaa9372189014278a10a8bdc98ed06a3508c1d59e825335406f8f1e02f66c29159e4f7167242637acd11db15629e36e3a1f48384703ffc7a548ee854458819a5068aea8f596496ab87da0359a19ac094b4c33736024b222b5cb0975edee55204871e5db39d15ee6de1b4e63d93f0d430af206caef7e4aca6446350ccf1d39803e6a20cc6c4cf1cd9ff2c5cc675f4a9f1f6eba2c0fa14269779d56159d92f0434ecb159773772272a477b0cd57c2fbb0d1e78e3c1784a8b8aa14fbc80b71daaed1ff4290142a6624ac8bd4ea6475c35ca9ab51458341c88", 0xdc, 0xfffffffffffffffc}], 0xb95247101d376409, &(0x7f00000002c0)='.+(GPL\x89[security,\x00') tkill(r19, 0x38) ptrace$cont(0x18, r19, 0x0, 0x0) ptrace$setregs(0xd, r19, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r19, 0x0, 0x0) write$P9_RREAD(r1, &(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x15) 14:09:06 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f00000000c0)=0x54) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x1000000000000005}, 0x1c) read$alg(r2, &(0x7f0000000240)=""/30, 0x1e) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000000af, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000200)) 14:09:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000006580)=[{{&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, 0x0}}, {{&(0x7f0000002c00)={0x2, 0x4e1f, @remote}, 0x10, 0x0, 0x0, &(0x7f0000002e40)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x18}}], 0x2, 0x0) dup2(0xffffffffffffffff, r1) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, 0x0, 0x0) socket$inet(0x2b, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) 14:09:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002a00100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000040)=""/39) ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, &(0x7f0000000100)={{0x2, @addr=0x2}, "c8e426322d9171f565482aaa8f63cb861bfefa0becb573cca133e6c75f349870", 0x3}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0xffffffffffffffff, 0x0, 0x1ff) 14:09:06 executing program 2: syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0xe200000000000000, 0x1, &(0x7f00000016c0)=[{&(0x7f00000006c0)="58465342b313a3612bcf8571dedf0b5083c622d543bb9902ca6cd43744a5", 0x1e, 0x48}], 0x0, 0x0) 14:09:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000006580)=[{{&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, 0x0}}, {{&(0x7f0000002c00)={0x2, 0x4e1f, @remote}, 0x10, 0x0, 0x0, &(0x7f0000002e40)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x18}}], 0x2, 0x0) dup2(0xffffffffffffffff, r1) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, 0x0, 0x0) socket$inet(0x2b, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) 14:09:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2136.099133][T16453] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 9401725982758477256 /dev/loop5 14:09:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2136.172888][T16447] XFS (loop2): Invalid superblock magic number 14:09:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:09:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:09:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0xfffff000}], 0x1) 14:09:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:09 executing program 2: fsopen(&(0x7f0000000040)='bdev\x00', 0x0) 14:09:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:09:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) set_robust_list(&(0x7f0000000140)={&(0x7f0000000080)={&(0x7f0000000040)}, 0xb2db, &(0x7f0000000100)}, 0x18) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) sched_rr_get_interval(r6, &(0x7f0000000000)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) 14:09:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0x43c}], 0x100000000000010a, 0xe) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0xffffffffffffffff) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0x6, 0xfffffffffffffffe]) 14:09:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$inet(r0, &(0x7f0000002680)={0x0, 0x0, 0x0}, 0x0) 14:09:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:09:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)="d30572c402814791", 0xfd68}, {&(0x7f0000000140)="8ccacb27acbc0105220667baa5f89e9971d22426aa276c9e040b7c23f8422774215175cf63f1671411cc1f08ce0658b70312912013dfdf61df086bb08b787c8e752e662624d2647370fbf205633065be81d3da2495148cbedc1fb699f80a48", 0x5f}], 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='\x04\x00\xd9!=\xa0\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000200)={0x4, @remote}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)="08e04fa431b7fb9d2d55e1dcc8ef21c1c5a2e20c9956ae5f6a8d0c6890eee17589f82c9332ec941ca15826ad9b2a49e7f47992832a12832004f7439fc8be610f2ae1861fedb7d77cec35e160ab92241326ca829a7b1594eeb9f8daafeeed024626b695b42a6015d92eb7cdd65ce2ec7a490c21f4f9c02a3dc9b7070d89fc208df9bd5b674177e6f12fdd62275c4ae725d7381ec263d16dc6a8d765a3e400"/172) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) ptrace$cont(0x9, r5, 0x0, 0x9) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x100) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r6, r7, 0x0, 0x7ffff000) getpeername$netlink(r7, &(0x7f00000002c0), &(0x7f0000000340)=0xc) 14:09:09 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f00000000c0)) 14:09:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) 14:09:10 executing program 2: mprotect(&(0x7f000001d000/0x1000)=nil, 0x1000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x10000006e) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) dup3(r1, r0, 0x0) 14:09:10 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:09:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:10 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:09:12 executing program 1: setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x789}, 0x24, 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x30001, 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000017010107002e2f66696c6530e735b0cbdb6567c2dfac9aafef664b46f6495de0f18500ea0a52e9573f6ca4d7e769ddbef62f6d24ea24aca9bbb8956d271f890dda3e053a53ba20b851ba634d5c62ffe707724820a8d45356457e6bde4b217446480d63c3f37a92aaf89427b6495e9d73c889a604c951552582ea06d55b1cb03560cb0f8e54a46604cc9622"], 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000140)='trusted.overlay.nlink\x00'}, 0x30) r2 = fcntl$getown(0xffffffffffffffff, 0x9) tkill(r2, 0x38) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000, 0x102) recvfrom$inet(r1, &(0x7f0000000200)=""/181, 0xb5, 0x9c4aabae0186dd27, &(0x7f0000000380)={0x2, 0x4e20, @rand_addr=0x1}, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) sync_file_range(r4, 0x3, 0x6, 0x0) ptrace$setregs(0xd, r0, 0x4000000000000000, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:09:12 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:09:12 executing program 2: add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 14:09:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:10:10 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b0000f4afd7030a7c", 0xfcd1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() sched_getaffinity(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 14:10:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000200)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, 0x0, &(0x7f0000000040)) 14:10:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) wait4(r5, 0x0, 0x80000000, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r6, r7, 0x0, 0x7ffff000) ioctl$NBD_SET_FLAGS(r7, 0xab0a, 0x3ff) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0xffffffffffffffff) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) 14:10:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = shmget$private(0x0, 0x3000, 0xc59a41ebd791c162, &(0x7f0000ffc000/0x3000)=nil) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff6920, 0x200) r5 = getpgid(0x0) ptrace$getsig(0x4202, r5, 0x340f, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000004300)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf2516000000201072000c008d006f0000000000000008004000", @ANYRES32=r5, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="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"/588, @ANYRES32=r5, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r5, @ANYBLOB="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"], 0x9}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = getpid() ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000280)=0x0) setpgid(r9, r10) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000240)={{0xfffffffffffffff8, r2, r3, r6, r7, 0x48, 0x10001}, 0x4, 0x1, 0x8, 0x10001, r0, r10, 0x4}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:10:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000002340)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000002380)=""/21) 14:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:10:10 executing program 3: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ptrace(0x11, r0) 14:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000200)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x20002101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, 0x0, &(0x7f0000000040)) 14:10:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) 14:10:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2201.735043][T17642] IPVS: ftp: loaded support on port[0] = 21 [ 2201.792841][T15450] device bridge_slave_1 left promiscuous mode [ 2201.800933][T15450] bridge0: port 2(bridge_slave_1) entered disabled state [ 2201.837499][T15450] device bridge_slave_0 left promiscuous mode [ 2201.843711][T15450] bridge0: port 1(bridge_slave_0) entered disabled state [ 2203.737020][T15450] device hsr_slave_0 left promiscuous mode [ 2203.776661][T15450] device hsr_slave_1 left promiscuous mode [ 2203.826243][T15450] team0 (unregistering): Port device team_slave_1 removed [ 2203.843675][T15450] team0 (unregistering): Port device team_slave_0 removed [ 2203.854488][T15450] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2203.902948][T15450] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2203.999855][T15450] bond0 (unregistering): Released all slaves [ 2204.113935][T17642] chnl_net:caif_netlink_parms(): no params data found [ 2204.143003][T17642] bridge0: port 1(bridge_slave_0) entered blocking state [ 2204.150329][T17642] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.158405][T17642] device bridge_slave_0 entered promiscuous mode [ 2204.166087][T17642] bridge0: port 2(bridge_slave_1) entered blocking state [ 2204.173255][T17642] bridge0: port 2(bridge_slave_1) entered disabled state [ 2204.180963][T17642] device bridge_slave_1 entered promiscuous mode [ 2204.199624][T17642] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2204.211414][T17642] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2204.231154][T17642] team0: Port device team_slave_0 added [ 2204.238687][T17642] team0: Port device team_slave_1 added [ 2204.300571][T17642] device hsr_slave_0 entered promiscuous mode [ 2204.359941][T17642] device hsr_slave_1 entered promiscuous mode [ 2204.473384][T17642] bridge0: port 2(bridge_slave_1) entered blocking state [ 2204.480526][T17642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2204.487927][T17642] bridge0: port 1(bridge_slave_0) entered blocking state [ 2204.494988][T17642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2204.542052][T17642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2204.557123][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2204.565846][T31964] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.574977][T31964] bridge0: port 2(bridge_slave_1) entered disabled state [ 2204.583705][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2204.598228][T17642] 8021q: adding VLAN 0 to HW filter on device team0 [ 2204.610269][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2204.619496][T31964] bridge0: port 1(bridge_slave_0) entered blocking state [ 2204.626599][T31964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2204.650107][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2204.659886][ T9911] bridge0: port 2(bridge_slave_1) entered blocking state [ 2204.667004][ T9911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2204.675865][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2204.703912][T17642] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2204.715220][T17642] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2204.729993][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2204.738719][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2204.748018][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2204.758214][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2204.781792][T12513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2204.794950][T17642] 8021q: adding VLAN 0 to HW filter on device batadv0 14:10:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:15 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) readlink(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000ac0)=""/82, 0x52) 14:10:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) socket$packet(0x11, 0x80a, 0x300) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 14:10:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x21000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) sched_getattr(r0, &(0x7f0000000000)={0x30}, 0x30, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) getpeername$netrom(r2, &(0x7f0000000100)={{0x3, @null}, [@rose, @rose, @null, @rose, @null, @default, @default]}, &(0x7f0000000080)=0x48) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000540)=""/4096) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000000)=0x1aa, 0x4) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2205.096486][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2205.102359][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:10:15 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c200000000000000000a08004500001c000000000100000000000000ac1e9a34f859692e49d9dc79000000009078ac1414aa"], 0x0) 14:10:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 2205.146454][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2205.152328][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2205.158193][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2205.164003][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2205.169850][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2205.175589][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2205.216474][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2205.222285][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:10:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000540)={{0x3, 0x4, 0x1, 0xfffffffffffffff8, 'syz1\x00', 0x800}, 0x0, [0x3f, 0xd, 0x6, 0x10001, 0x2b0b, 0x4, 0x20a2, 0x9, 0x200, 0x6750, 0x1, 0x401, 0x8000, 0x8, 0x7fff, 0x9, 0x6, 0x200000, 0x7, 0x2, 0x3, 0xffffffffffff12b5, 0x10000, 0xfff, 0x7, 0x400, 0x7, 0xa7, 0x1, 0xcd8, 0xff, 0x1, 0x1ff, 0x3af, 0x4, 0xc64, 0x0, 0x3, 0x1000, 0x7ff, 0x9, 0x0, 0x101, 0x7ff, 0x9, 0x5, 0x2, 0x718ea7d3, 0x1000, 0x1ff, 0x1, 0x2, 0x80, 0x6, 0x8, 0xfffffffffffffffe, 0x8, 0x1, 0xa2, 0x3, 0x6, 0xff, 0x100000000, 0xb52, 0x4e0d, 0x4, 0x54d, 0x5, 0x100, 0xfffffffffffffffa, 0x0, 0x4, 0x3, 0x3f, 0x7fff, 0x0, 0x3, 0x7, 0x6, 0x8000, 0x10000, 0x8, 0xe797, 0x10001, 0x5, 0x7, 0xfffffffffffffffd, 0x8000, 0xb5, 0x3, 0x2, 0x400, 0x0, 0xfffffffffffffffe, 0x8000, 0x8a, 0x4, 0x87f6, 0x1, 0xffffffffffff7fff, 0x5e61, 0x4, 0x100000000, 0xa0, 0x8, 0xa7, 0x8000, 0x0, 0x3, 0x800, 0xd19, 0x7, 0x100000001, 0x10001, 0x1, 0x49, 0x2, 0xe9, 0x7f, 0x401, 0x8, 0x7fffffff, 0x2, 0x7fff, 0x7, 0x1, 0x7b9, 0x100000001], {0x77359400}}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x1fffe0000000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:10:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getpid() tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) dup2(r1, r0) 14:10:16 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff0180c2000000080600010800060400014b056a3af507b592ddba0180c2000000ffffd4eb"], 0x0) 14:10:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:10:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x40) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0xac, 0xce4) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x9, 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0xc, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:10:18 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x5f) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:10:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffbffe}}, 0x43) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x200000, 0x100}, 0x2c) 14:10:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:10:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) 14:10:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0xfffffffffffffffe, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x2, 0x4) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000040)=0x7) 14:10:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) mq_notify(r1, &(0x7f0000000040)={0x0, 0x3e, 0xcc46fa890577ec9, @tid=r0}) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x8819a8d017c63c0f}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r6, 0x401}}, 0x18) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:19 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) 14:10:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:10:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) perf_event_open(0x0, r5, 0x4, r4, 0x102) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) r10 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r10, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r11 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r10, r11, 0x0, 0x7ffff000) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f0000000080)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r12) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r13 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r13, 0x0, 0x0) tkill(r13, 0x38) ptrace$cont(0x18, r13, 0x0, 0x0) ptrace$setregs(0xd, r13, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r13, 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000040)=0x4) 14:10:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d980800", 0xb6}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:10:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:10:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 14:10:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040)) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) sched_getparam(r1, &(0x7f0000000080)) connect$netlink(r0, &(0x7f0000000100)=@unspec, 0xc) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 2208.805216][T18484] ptrace attach of "/root/syz-executor.1"[18346] was attempted by "/root/syz-executor.1"[18484] 14:10:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:10:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x12], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}) 14:10:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:10:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) setpgid(0x0, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = getpid() ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000280)=0x0) setpgid(r10, r11) perf_event_open(0x0, r10, 0x4, r9, 0x102) ptrace$cont(0x7, r10, 0x0, 0x0) r12 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r13 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r12, r13, 0x0, 0x7ffff000) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r13, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000040)=0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r14 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xa2, 0x100) ioctl$VHOST_SET_LOG_FD(r14, 0x4004af07, &(0x7f0000000100)=r13) 14:10:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x11e], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}) 14:10:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:22 executing program 3: 14:10:22 executing program 3: 14:10:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x20000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000000000)={0x30, 0x3f, 0x5, 0x100}, 0x6) ptrace$setopts(0x4206, r3, 0x0, 0x8) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r6, r7, 0x0, 0x7ffff000) ioctl$KVM_GET_FPU(r7, 0x81a0ae8c, &(0x7f0000000100)) tkill(r3, 0x38) ptrace$setopts(0x4200, r3, 0x9, 0x100000) ptrace$cont(0x18, r3, 0x0, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r8, 0x0, 0xffffffffffffff8d, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x21c) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r8, r9, 0x0, 0x7ffff000) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/316, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r10, 0x84, 0x76, &(0x7f00000000c0)={r12}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000080)={0x2, 0x9, 0x10005, 0x2, 0x3ff, 0x8001, 0x80, 0xfffffffffffffd6b, r12}, &(0x7f00000002c0)=0x20) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x10000, 0x0) 14:10:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:10:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:10:22 executing program 3: 14:10:22 executing program 2: 14:10:22 executing program 3: 14:10:22 executing program 2: 14:11:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0x165}, {0x0, 0xffffffffffffff1f}, {&(0x7f0000000200)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905086af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156de6dacf765d23ae243ab3e756af45773d75a31f1da0d45276865e87332", 0xd4}], 0x0, 0x18) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) tkill(r3, 0x3d) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r4) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:11:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:11:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:11:22 executing program 3: 14:11:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:11:22 executing program 2: 14:11:22 executing program 2: 14:11:22 executing program 3: 14:11:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:11:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff6920, 0x200) r2 = getpgid(0x0) ptrace$getsig(0x4202, r2, 0x340f, &(0x7f0000000340)) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000080)=[{&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/119, 0x77}, {&(0x7f0000000d40)=""/127, 0x7f}], 0x3) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e00)={r6, 0x0, 0x1, 0x8, &(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) preadv(r4, &(0x7f0000000c40)=[{&(0x7f0000000180)=""/88, 0x58}, {&(0x7f0000000200)=""/209, 0xd1}, {&(0x7f0000000600)=""/158, 0x9e}, {&(0x7f00000003c0)=""/67, 0x43}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/137, 0x89}], 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000007c0)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf2516000000201072000c008d006f0000000000000008004000", @ANYRES32=r2, @ANYBLOB='\x00', @ANYRES32=r7, @ANYBLOB="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"/588, @ANYRES32=r2, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r2, @ANYBLOB="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"], 0x9}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x2, 0x1, r0, 0x0, r7, 0x0, 0x2, 0x2}) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', 0x0, r8) ptrace$cont(0x9, r0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) 14:11:22 executing program 2: 14:11:22 executing program 4: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2273.537285][T30974] device bridge_slave_1 left promiscuous mode [ 2273.543573][T30974] bridge0: port 2(bridge_slave_1) entered disabled state [ 2273.598447][T30974] device bridge_slave_0 left promiscuous mode [ 2273.604694][T30974] bridge0: port 1(bridge_slave_0) entered disabled state [ 2275.577008][T30974] device hsr_slave_0 left promiscuous mode [ 2275.616604][T30974] device hsr_slave_1 left promiscuous mode [ 2275.666170][T30974] team0 (unregistering): Port device team_slave_1 removed [ 2275.681247][T30974] team0 (unregistering): Port device team_slave_0 removed [ 2275.692399][T30974] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2275.730983][T30974] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2275.832739][T30974] bond0 (unregistering): Released all slaves [ 2275.935594][T18903] IPVS: ftp: loaded support on port[0] = 21 [ 2276.009192][T18903] chnl_net:caif_netlink_parms(): no params data found [ 2276.042663][T18903] bridge0: port 1(bridge_slave_0) entered blocking state [ 2276.049951][T18903] bridge0: port 1(bridge_slave_0) entered disabled state [ 2276.057759][T18903] device bridge_slave_0 entered promiscuous mode [ 2276.112795][T18903] bridge0: port 2(bridge_slave_1) entered blocking state [ 2276.120062][T18903] bridge0: port 2(bridge_slave_1) entered disabled state [ 2276.134297][T18903] device bridge_slave_1 entered promiscuous mode [ 2276.162512][T18903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2276.174801][T18903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2276.198095][T18903] team0: Port device team_slave_0 added [ 2276.205352][T18903] team0: Port device team_slave_1 added [ 2276.299270][T18903] device hsr_slave_0 entered promiscuous mode [ 2276.336827][T18903] device hsr_slave_1 entered promiscuous mode [ 2276.376483][T18903] debugfs: Directory 'hsr0' with parent '/' already present! [ 2276.402427][T18903] bridge0: port 2(bridge_slave_1) entered blocking state [ 2276.409575][T18903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2276.416992][T18903] bridge0: port 1(bridge_slave_0) entered blocking state [ 2276.424052][T18903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2276.480469][T18903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2276.494971][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2276.504884][ T9911] bridge0: port 1(bridge_slave_0) entered disabled state [ 2276.515150][ T9911] bridge0: port 2(bridge_slave_1) entered disabled state [ 2276.538025][T18903] 8021q: adding VLAN 0 to HW filter on device team0 [ 2276.556840][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2276.565918][T31964] bridge0: port 1(bridge_slave_0) entered blocking state [ 2276.573076][T31964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2276.610265][T12513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2276.619878][T12513] bridge0: port 2(bridge_slave_1) entered blocking state [ 2276.627012][T12513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2276.653072][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2276.671132][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2276.694157][T18903] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2276.711142][T18903] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2276.724880][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2276.740376][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2276.753514][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2276.777512][T18903] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2276.785290][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:11:27 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clock_gettime(0x0, 0x0) tkill(r0, 0x800000000000003d) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x7, 0x20000004, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:11:27 executing program 3: 14:11:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:11:27 executing program 4: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:11:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default}) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) perf_event_open(0x0, r4, 0x4, r3, 0x102) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) perf_event_open(0x0, r8, 0x4, r7, 0x102) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:11:27 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:11:27 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) [ 2277.046750][T18922] input: syz1 as /devices/virtual/input/input16 14:11:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) close(r0) 14:11:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) [ 2277.199409][T18940] input: syz1 as /devices/virtual/input/input17 14:11:27 executing program 4: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:11:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1) socket(0x8, 0x5, 0x3) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001580)=ANY=[@ANYBLOB="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"/2099], 0x833) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)={0x0, @remote, 0x0, 0x0, 'dh\x00', 0x0, 0x9, 0x21}, 0x2c) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000340)=ANY=[@ANYBLOB="0202200313000000000000ffff00ff1005000600571866720a000068c3f2b5359eed8104200000005500000000000000000000000000000005000900df0000002a00002000000000fe8000000000000007000000000000ff00000000000000000200010000ffff000000050d0000000005000500eb0000000a00000000000000ff020000000000000000000008f500010000000000000000"], 0x98}}, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000510000/0x2000)=nil) 14:11:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f00000000c0)=0x200006d26, 0x4) read(r0, 0x0, 0x0) 14:11:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) [ 2277.586007][T19060] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:11:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r3, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) sched_getscheduler(r3) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r6 = getpgrp(0xffffffffffffffff) write$cgroup_pid(r5, &(0x7f0000000040)=r6, 0x12) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:11:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:11:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10201, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000000)={0x6, 0x4, 0x7f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xd}, 'veth1_to_bridge\x00'}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) perf_event_open(0x0, r5, 0x4, r4, 0x102) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) ptrace$pokeuser(0x6, r2, 0x9, 0x3) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/18, 0x12}, &(0x7f0000000080), 0x1}, 0x20) 14:12:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r1, r2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r6, r7, 0x0, 0x7ffff000) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = getpid() ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000280)=0x0) setpgid(r10, r11) perf_event_open(0x0, r10, 0x4, r9, 0x102) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r12 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(r12, 0x38) ptrace$cont(0x18, r12, 0x0, 0x0) ptrace$setregs(0xd, r12, 0x0, &(0x7f0000000080)) r13 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) r14 = socket$inet6_sctp(0xa, 0x1, 0x84) r15 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r14, 0x84, 0x76, &(0x7f00000000c0)={r16}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r13, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=r16, @ANYBLOB="ff03060000001feb5c10b1da0875b76e"], 0x14) ptrace$cont(0x9, r12, 0x0, 0x0) 14:12:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) 14:12:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10201, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000000)={0x6, 0x4, 0x7f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xd}, 'veth1_to_bridge\x00'}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) perf_event_open(0x0, r5, 0x4, r4, 0x102) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r3, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) sched_getscheduler(r3) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r6 = getpgrp(0xffffffffffffffff) write$cgroup_pid(r5, &(0x7f0000000040)=r6, 0x12) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:28 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) [ 2337.549079][T19195] ptrace attach of "/root/syz-executor.0"[19192] was attempted by "/root/syz-executor.0"[19195] 14:12:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:12:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10201, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000000)={0x6, 0x4, 0x7f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xd}, 'veth1_to_bridge\x00'}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) perf_event_open(0x0, r5, 0x4, r4, 0x102) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r3, r4) perf_event_open(0x0, r3, 0x4, r2, 0x102) sched_getscheduler(r3) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r6 = getpgrp(0xffffffffffffffff) write$cgroup_pid(r5, &(0x7f0000000040)=r6, 0x12) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) dup2(r1, r0) [ 2339.407682][ T8780] device bridge_slave_1 left promiscuous mode [ 2339.413904][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2339.467558][ T8780] device bridge_slave_0 left promiscuous mode [ 2339.473760][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2341.317059][ T8780] device hsr_slave_0 left promiscuous mode [ 2341.376547][ T8780] device hsr_slave_1 left promiscuous mode [ 2341.443963][ T8780] team0 (unregistering): Port device team_slave_1 removed [ 2341.458394][ T8780] team0 (unregistering): Port device team_slave_0 removed [ 2341.469544][ T8780] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2341.513483][ T8780] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2341.603437][ T8780] bond0 (unregistering): Released all slaves [ 2341.715729][T19231] IPVS: ftp: loaded support on port[0] = 21 [ 2341.785408][T19231] chnl_net:caif_netlink_parms(): no params data found [ 2341.813906][T19231] bridge0: port 1(bridge_slave_0) entered blocking state [ 2341.821329][T19231] bridge0: port 1(bridge_slave_0) entered disabled state [ 2341.829500][T19231] device bridge_slave_0 entered promiscuous mode [ 2341.837590][T19231] bridge0: port 2(bridge_slave_1) entered blocking state [ 2341.844707][T19231] bridge0: port 2(bridge_slave_1) entered disabled state [ 2341.852768][T19231] device bridge_slave_1 entered promiscuous mode [ 2341.874850][T19231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2341.921430][T19231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2341.950456][T19231] team0: Port device team_slave_0 added [ 2341.963973][T19231] team0: Port device team_slave_1 added [ 2342.079417][T19231] device hsr_slave_0 entered promiscuous mode [ 2342.126827][T19231] device hsr_slave_1 entered promiscuous mode [ 2342.166482][T19231] debugfs: Directory 'hsr0' with parent '/' already present! [ 2342.195325][T19231] bridge0: port 2(bridge_slave_1) entered blocking state [ 2342.202454][T19231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2342.209865][T19231] bridge0: port 1(bridge_slave_0) entered blocking state [ 2342.216964][T19231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2342.294498][T19231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2342.318278][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2342.332567][ T2835] bridge0: port 1(bridge_slave_0) entered disabled state [ 2342.352684][ T2835] bridge0: port 2(bridge_slave_1) entered disabled state [ 2342.368328][T19231] 8021q: adding VLAN 0 to HW filter on device team0 [ 2342.381670][ T2835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2342.390529][ T2835] bridge0: port 1(bridge_slave_0) entered blocking state [ 2342.397676][ T2835] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2342.425032][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2342.435976][T32674] bridge0: port 2(bridge_slave_1) entered blocking state [ 2342.443112][T32674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2342.476191][T19231] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2342.487043][T19231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2342.501622][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2342.511596][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2342.521239][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2342.532841][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2342.553484][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2342.562708][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2342.574182][T19231] 8021q: adding VLAN 0 to HW filter on device batadv0 14:12:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a00", 0x31, 0x10000}], 0x0, 0x0) 14:12:33 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000010c0)=ANY=[@ANYBLOB="1100000042000501000000366ab1001000ed623c087d41ee19776b1d9ada6676c7517f97b2d2add33be3693e6a4c651514fd9a9c7c4b9d5f8e1656e057a8cbb9cd3712f039298f550000000000000000006f1e6b7fd6400b24fb2c6a22990174a3263e6747b41eb5a2c83655f7b8e56c4b1e0cbaf21562cba9909012f8fec072d06c4726e8ae7a6007bb4a1d5b3cd8ef2f251937793ae4857a30f80c2ce756cc57bf5775"], 0x14}}, 0x0) clock_gettime(0x0, 0x0) 14:12:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) read(r2, &(0x7f0000000000)=""/250, 0xedf1d44) 14:12:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:33 executing program 1: gettid() r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) perf_event_open(0x0, r2, 0x4, r1, 0x102) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x38) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) 14:12:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000010c0)=ANY=[@ANYBLOB="1100000042000501000000366ab1001000ed623c087d41ee19776b1d9ada6676c7517f97b2d2add33be3693e6a4c651514fd9a9c7c4b9d5f8e1656e057a8cbb9cd3712f039298f550000000000000000006f1e6b7fd6400b24fb2c6a22990174a3263e6747b41eb5a2c83655f7b8e56c4b1e0cbaf21562cba9909012f8fec072d06c4726e8ae7a6007bb4a1d5b3cd8ef2f251937793ae4857a30f80c2ce756cc57bf5775"], 0x14}}, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 14:12:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a00", 0x31, 0x10000}], 0x0, 0x0) 14:12:33 executing program 2: r0 = memfd_create(&(0x7f0000000080)='/vboxnet0:em1wlan0mime_type\x00', 0x0) write(r0, &(0x7f0000000040)="20a2acab", 0x4) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/159, 0x0) [ 2343.044190][T19458] ptrace attach of "/root/syz-executor.1"[19452] was attempted by "/root/syz-executor.1"[19458] 14:12:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x2, 0x0, 0xffffffffffffff93, &(0x7f00000000c0)="21440bd3b91380db83dddecafc8e0e9cc2"}) 14:12:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a00", 0x31, 0x10000}], 0x0, 0x0) 14:12:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000010c0)=ANY=[@ANYBLOB="1100000042000501000000366ab1001000ed623c087d41ee19776b1d9ada6676c7517f97b2d2add33be3693e6a4c651514fd9a9c7c4b9d5f8e1656e057a8cbb9cd3712f039298f550000000000000000006f1e6b7fd6400b24fb2c6a22990174a3263e6747b41eb5a2c83655f7b8e56c4b1e0cbaf21562cba9909012f8fec072d06c4726e8ae7a6007bb4a1d5b3cd8ef2f251937793ae4857a30f80c2ce756cc57bf5775"], 0x14}}, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 14:12:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0xd7f7d4a, 0x9, &(0x7f0000004140)=[{&(0x7f0000000380)="e384e770e0210417e986e5a6f5f5eeea5e4ff1a3128bbff84e67351d730bbf6ac4bba6f326c14109cf47b11ef40d232159abd69b46b0d7", 0x37, 0x8}, {&(0x7f0000000400)="3dc782782f71b06e6ffc7cdec6ab30", 0xf, 0x7fffffff}, {&(0x7f0000003e00)="33828a2685746150fcf1a2b78f16c2ac7c48441de78d3b72e954a6f32ceb824af020944a88b37551b45e269aefa69ae3d987d4da1c44f451c931d22009d2add13681b579a9b7aad3313ad01009117e51aab64d83a51ca04db07f317ecd6e184c85f4341d647e683f414404e330aff28705ce2f3af3765ae3bede025702368c8d98add26d662b2cc8ce4db3715ca548697625f391a3981e60d737589b883b41406717cc05a01885ab8be2", 0xaa, 0x1}, {&(0x7f0000000440)="b0ae74b4a35ed62578f30543d0333d8fe2cc7a49", 0x14, 0x1f}, {&(0x7f0000003ec0)="76f4eff10ceeac1161cb8f9bf6b336c9ee9e03f1105daccd83c4fc1c2529120e4d0237d9f128e7f6ec8a06bec0a08d526cc20d5d07097e4a416f8582210568c7faadea0ead6ee1f191964f499f6a36aa07e7780cfe3c0e36e02479", 0x5b, 0x100}, {&(0x7f0000003f40)="e459e6d4b0bb0ceeab928c28943ceead21ab25cd013b73ef64fb06bcf62d99b3ceac7b8882d591091eeec42190a8fdb001bb53bdee29c418df01f5cfaacd9c0b4e4e9272cbbbaae6b18a1367d90ae6c05beb6370325d0f29505a1a5d00205319db6c78c778c841671f6f7f339ef020a829943a", 0x73, 0x870}, {&(0x7f0000003fc0)="8baba533a6b392ea07e9d174877319a183bb3f8c5f00f58b624adbffa1688b0671baba85a9c2d1fba90ee1b69e1d6c2471544ea27f7698b1670e3f158b1e99e3e8053d0e08af202952fef18d8679cb577eb6d0874f99f02931c2ea43a8116d7471daf6e3", 0x64, 0x5}, {&(0x7f0000004040)="d213a87b52baa53975e38c55fd51011404465e5c6b49f14854b05a02430346d26c854579e1ffdfcec79bd894e4ed838f67db033c9704386a8ce75656205ffa66f9c6b20f6629b024da5421ddd97fc733c0ae0487cd0df042cde9498e2fd77d6a0b0cec78199bee3055d60207c3801ad180a130ae4bb391bb9b783058c2fb8ee14a5a2cc72f36a108938523229aa90312772881fd8449a76e2bceb1db00d343a315c918f8d1ea80dfc398251cd12c4ceeb5a53765a1a651ea7a7fd55ad849414d3201d8f5199f1e8d27ecd4ee9ac9f7c252124366d69a9647df451894f9899f67da9dc760", 0xe4, 0x3}, {&(0x7f00000004c0)="35cbb534598d8ad649a16b2e64453cf3f7c64faab6ef867945aa0353a7712d5a", 0x20, 0x34dd30d1}], 0x1000000, &(0x7f00000042c0)={[{@nls={'nls', 0x3d, 'macromanian'}}, {@umask={'umask', 0x3d, 0xffffffffffff8001}}, {@gid={'gid', 0x3d, r1}}, {@disable_sparse_yes='disable_sparse=yes'}], [{@fsmagic={'fsmagic', 0x3d, 0x8000}}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}]}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x3, &(0x7f0000000100)=[0xee00, r1, r2]) 14:12:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000800)=[{0x0}], 0x0) [ 2343.407319][T19550] ptrace attach of "/root/syz-executor.1"[19549] was attempted by "/root/syz-executor.1"[19550] 14:12:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r3, 0x0, 0x7ffff000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d339b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x38) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) r5 = socket(0x11, 0x3, 0xfffffffffffffc01) recvfrom$unix(r5, &(0x7f0000000240), 0x0, 0x40012003, 0x0, 0x713) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1}, &(0x7f0000000340)=0xc) setsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000001c0)={@loopback, r7}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000140)={'vcan0\x00', r7}) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000180)={r8, 0x3, 0x40, 0x9, 0x8, 0x7, 0x101}) ptrace$cont(0x9, r4, 0x0, 0x0) 14:12:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000", 0x3d, 0x10000}], 0x0, 0x0) 14:12:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x1) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) shutdown(r0, 0x0) [ 2343.938149][T19610] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 9401725982758477256 /dev/loop2 14:12:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000", 0x3d, 0x10000}], 0x0, 0x0) 14:12:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2343.987857][T19610] BTRFS: Invalid seeding and uuid-changed device detected [ 2344.084776][T19610] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 9401725982758477256 /dev/loop2 14:12:34 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 14:12:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2344.188952][T19610] BTRFS: Invalid seeding and uuid-changed device detected 14:12:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000", 0x3d, 0x10000}], 0x0, 0x0) 14:12:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2344.580383][T19848] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 9401725982758477256 /dev/loop2 [ 2344.636449][T19848] BTRFS: Invalid seeding and uuid-changed device detected 14:12:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x100000001) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r3}, 0x8) 14:12:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, 0x0) 14:12:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, 0x0) [ 2346.776206][T19866] sctp: [Deprecated]: syz-executor.3 (pid 19866) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2346.776206][T19866] Use struct sctp_sack_info instead [ 2346.777447][T19869] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 9401725982758477256 /dev/loop2 14:12:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2346.863915][T19869] BTRFS: Invalid seeding and uuid-changed device detected 14:12:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x9, 0x9, 0x6, 0x1, 0x3, 0xffffffffffffff00}, 0xff}, 0xa) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create1(0x40000) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:12:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, 0x0) 14:12:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002}) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_map={0x1ff}}) r3 = socket$nl_route(0x10, 0x3, 0x0) dup2(r3, r1) 14:12:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:37 executing program 1: clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 2347.326283][T20101] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 9401725982758477256 /dev/loop2 [ 2347.339128][T20101] BTRFS: Invalid seeding and uuid-changed device detected 14:12:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:38 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') preadv(r0, &(0x7f0000001600)=[{&(0x7f00000000c0)=""/71, 0x47}], 0x1, 0x3d) 14:12:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:12:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000000)={0x38}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:38 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:38 executing program 3: sysinfo(&(0x7f00000000c0)=""/23) 14:12:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 14:12:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff028}, {0x80000006}]}, 0x10) 14:12:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:12:38 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) ptrace$setregs(0xf, r3, 0x5, &(0x7f0000000100)="c90e8d82e5c44f6ae08d3b9f72a487772abc1d7ab74a1cd79391eb85f17a785dbb935fe435226a61bd6f75be8a2790632c1a8fdb15c63812775100ec9b4e40c7672a113a6c8a7e2b672c81a9e956413301a02c66a0f88b636d77c910761a1466d5b6bd1141cf1d08bde42576f1f44238fd4d3fb9d1582a91e08f8a3a9ee4365ef8519a5ac52fb88453ddae3360e7cddca52c8c7a0ca45ba170bd98b731e502981122c7b4dfb7dd75fad2b58c7eb05d52ef935171dcb788443c3e402203639e6d8a2030005c917ec7dd506615fc4f234186318d7bffcb7d90880192919acb841c9e938eae4abe1d4195") ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:12:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:12:41 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:41 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 14:12:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006580)=[{{&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)}}], 0x2, 0x0) socket$inet(0x2b, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000080)) 14:12:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r2, 0x520, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x9}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x80) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:41 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:12:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:12:42 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:12:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x1, 0x82) r2 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000036c0)=[{{&(0x7f00000008c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000940)=""/40, 0x28}, {0x0}, {&(0x7f00000009c0)=""/225, 0xe1}, {&(0x7f0000000ac0)=""/215, 0xd7}, {&(0x7f0000000bc0)=""/11, 0xb}], 0x5, &(0x7f0000000d80)=""/77, 0x4d}, 0xfffffffffffffff7}, {{&(0x7f0000000e00)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000002380)=""/243, 0xf3}, 0x40000}, {{&(0x7f0000002480)=@caif=@util, 0x80, &(0x7f0000002680)=[{0x0}], 0x1, &(0x7f00000026c0)=""/4096, 0x1000}, 0x2}], 0x3, 0x40012160, &(0x7f0000003780)={0x77359400}) r3 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x2) sendfile(r0, r1, &(0x7f0000000080), 0x20002000005) prctl$PR_MCE_KILL_GET(0x22) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) recvmmsg(r2, &(0x7f0000004280)=[{{&(0x7f00000002c0)=@nl=@unspec, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/29, 0x1d}, {&(0x7f0000000500)=""/237, 0xed}, {&(0x7f0000000600)=""/162, 0xa2}, {&(0x7f00000006c0)=""/208, 0xd0}, {0x0}], 0x5, &(0x7f00000037c0)=""/155, 0x9b}}, {{&(0x7f0000000f00)=@hci, 0x80, &(0x7f0000003a80)=[{0x0}, {&(0x7f0000003940)=""/210, 0xd2}, {&(0x7f0000000980)=""/6, 0x6}], 0x3}}, {{&(0x7f0000003ac0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003dc0), 0x0, &(0x7f0000003e00)=""/120, 0x78}, 0xa16b}, {{&(0x7f0000003e80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004240)=[{&(0x7f0000003f00)=""/218, 0xda}, {&(0x7f0000004000)=""/226, 0xe2}, {&(0x7f0000004100)=""/164, 0xa4}], 0x3}, 0xffff}], 0x4, 0x2000, &(0x7f0000004380)={0x77359400}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000043c0)={r4, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000000280)) getpgrp(0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) geteuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc) fstat(r5, &(0x7f0000001b80)) r6 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0xc0881) pwritev(r6, &(0x7f0000000e80)=[{&(0x7f0000004400)="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", 0x1000}, {&(0x7f0000005400)="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", 0x1000}, {&(0x7f0000000240)="0d887995298c8fead2ccf9fac7ea1c4cdf3c88db99621feb9db635f5abee8d4061e1f21e2d84c2a4ceef975ca1fe", 0x2e}, {&(0x7f0000000480)="937f7229495acc7d6ea6a6bfabc5bce7441168e19ea1959983a01ff1785a0e306abfe6508955445c7073a82379624bf700906bba75c1d276c0b1859b9a427e81f1dc08694344b6731295709292b5855617492fdd296793b36fb60feffa1ecd52e27e697bc51779a7", 0x68}, {&(0x7f00000007c0)="1b14a644c8591019316f7976db5e548b122ea37d5cf7e12310121053c8633a22de17b10340d83fef91e7daadb7d06ee513f0e926561c826348c76d4c32b2f052d1647e4c78475b7c713c86d12c8ce34c5f23a9cb4748166acd977e61edc59d2240d0ce2e3ce74d5c428e08128ea32724ae3c09edc295b16dc4da5cecafa0cf6672d4af", 0x83}, {&(0x7f0000000c00)="1693245c1ac96828cef310ca33c0d1b69f1c5c3a258f158b9cf4e295ee5bfdbb90f0b39dfaf097be0a80fd83ced83e14cffd7445a074ad53ead625f3faafccb8d8de330b72c0bf915c98cc3ca69f0228dfe6cf7f5f4df7feb8799e4c48fa51a2ffeeba38b4e7e84a9266a7349f1f3072367659e9c8575149d1162ff134e98898dd0fac0f578e49d2", 0x88}], 0x6, 0x5) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000001c00)={{{@in=@broadcast, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, 0x0) getresuid(&(0x7f0000001d40), 0x0, &(0x7f0000001dc0)) 14:12:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:42 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 14:12:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000010c0)=ANY=[@ANYBLOB="1100000042000501000000366ab1001000ed623c087d41ee19776b1d9ada6676c7517f97b2d2add33be3693e6a4c651514fd9a9c7c4b9d5f8e1656e057a8cbb9cd3712f039298f550000000000000000006f1e6b7fd6400b24fb2c6a22990174a3263e6747b41eb5a2c83655f7b8e56c4b1e0cbaf21562cba9909012f8fec072d06c4726e8ae7a6007bb4a1d5b3cd8ef2f251937793ae4857a30f80c2ce756cc57bf5775"], 0x14}}, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r1, 0xda49435e32b3784, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}}, 0x0) 14:12:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/netstat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000007c0), 0x20) 14:12:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000040)={0x0, 0x101, 0x1, [], &(0x7f0000000000)=0x340}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) write$P9_RSTATFS(r4, &(0x7f0000000100)={0x43, 0x9, 0x1, {0x0, 0x8, 0x8000, 0x1, 0x2, 0x71d, 0x7ff, 0x401, 0x74cb31c}}, 0x43) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f0000000180)=""/144) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:12:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000021c0)='net\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xefI\xcf\n\x9a7\x9d\x1bds\xa38+\xb6\xf6\xd1c\xda%\xb3\xec\x9e\xf5\xfc\xa8Nmf\xf0/`$\xe3\xcaK\x89\xcc\'\x80\xe9\x05\v\xda\xe6 \xaddW\x86/R\xca\xb1\x16z%\xae\xb8\x88\xd4\xdf\xca\b\x8f\x17\x84\x0f\x88\x83\xb1\xd5\xb3\x1c:z\xb6\xa6(\xa5\xbd\x00\xb9\x99\x93\xc6*k\x1dn\n\xda3\x9e\x15\x0e\xf1\x85\xd7y\xf7\xdf\xa4F\xf4\x12\xae\xa0\xc2\xf3f\xb6K\x0e7\xebK\x84<\x05D\xe6\xdcs\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1cK\xf9\xd0\xc4\xd7\xc0SM}\x18\\\xe0&\xe9\xfbO\x97f\xf7\x9c\xa7\x7f)\xbfI\x01\x1087\xe5\a\xd1\x81\xa8\x91Ce\x87\\\x8c\x1b\xf3\xd6\xa3\xdc\x12\xa9\x96\x8f\x1e\xe4?\x14\xb1\xc3\xa6\x1f\xbd\x83&\xed\a\xd2\x1f2\xe4\x18\xd2\xfdd\xe1\x1d\\\xeb\xcf\xd2\xc1\xf7qb\x1b\x14\x01\xd3\xf9\'\x14-_\f\xb8\xd3b\xb3[\xed\x94+(_\x19\xb3X\xc128r\x7f9\f\xb1p\xff\xc8\x16\x86wz\xa6\xe1\xedB\x12B\x9f\x01\x1e\xf7\x9b\x16\x04X[\x87LPg\x80}\x83_\xda\xacfb\xff\xfd\x8f\xd3\x19\xe9\x1c\x95G\xd3k\xae\x1a\xde\r[\x81\xe8\x92\x81\xcc\x19\xd0\xa5z\x84\xf4\x8fZ.') getdents64(r0, &(0x7f00000001c0)=""/4096, 0x1000) getdents64(r0, 0x0, 0x328) syz_open_procfs(0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x0) 14:12:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:12:45 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000001c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 14:12:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:12:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47b") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2355.204055][T21044] proc: Unknown parameter '¨6Š›ø]Åcše!­?šteéòcÎZ%š' 14:12:46 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r1, &(0x7f0000006700)=[{{0x0, 0x0, &(0x7f0000001400)=[{0x0}], 0x1}, 0x8}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x1dd04d7dd8138bdc, 0x0) tkill(r0, 0x11) syz_open_procfs(0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r3 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000100)) setsockopt$inet_mreqn(r3, 0x0, 0x7946e98e718f4413, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r4 = creat(&(0x7f0000000380)='./file0\x00', 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f0000000200)={@mcast1}, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r5, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) r6 = socket$inet(0x10, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r7 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) dup(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bb40)={{{@in6=@local, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f000000bc40)=0xe8) wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') r8 = creat(&(0x7f0000000380)='./file0\x00', 0x0) dup(r8) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') dup(0xffffffffffffffff) getdents64(r9, 0x0, 0x227) 14:12:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0xffffffffffffffff, 0x0, 0x84827303f4d8b467) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0xfffffffffffffffc, 0x0) 14:12:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:12:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:48 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() clock_gettime(0x0, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) ptrace(0x4000000010, r0) 14:12:48 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r1, &(0x7f0000006700)=[{{0x0, 0x0, &(0x7f0000001400)=[{0x0}], 0x1}, 0x8}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x1dd04d7dd8138bdc, 0x0) tkill(r0, 0x11) syz_open_procfs(0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r3 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000100)) setsockopt$inet_mreqn(r3, 0x0, 0x7946e98e718f4413, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r4 = creat(&(0x7f0000000380)='./file0\x00', 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f0000000200)={@mcast1}, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r5, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) r6 = socket$inet(0x10, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r7 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) dup(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bb40)={{{@in6=@local, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f000000bc40)=0xe8) wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') r8 = creat(&(0x7f0000000380)='./file0\x00', 0x0) dup(r8) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') dup(0xffffffffffffffff) getdents64(r9, 0x0, 0x227) 14:12:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace(0x8, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) socket$inet(0x2, 0x4, 0x6) ptrace$setopts(0x4206, r3, 0xb2, 0x8) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) wait4(r6, &(0x7f0000000000), 0x80000000, &(0x7f0000000100)) 14:12:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:12:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:48 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r1, &(0x7f0000006700)=[{{0x0, 0x0, &(0x7f0000001400)=[{0x0}], 0x1}, 0x8}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x1dd04d7dd8138bdc, 0x0) tkill(r0, 0x11) syz_open_procfs(0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r3 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000100)) setsockopt$inet_mreqn(r3, 0x0, 0x7946e98e718f4413, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r4 = creat(&(0x7f0000000380)='./file0\x00', 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f0000000200)={@mcast1}, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r5, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) r6 = socket$inet(0x10, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r7 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) dup(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bb40)={{{@in6=@local, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f000000bc40)=0xe8) wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') r8 = creat(&(0x7f0000000380)='./file0\x00', 0x0) dup(r8) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') dup(0xffffffffffffffff) getdents64(r9, 0x0, 0x227) 14:12:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x80, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={0x1}) 14:12:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 2357.998390][T21509] input: syz1 as /devices/virtual/input/input18 14:12:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000040)={0x6, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}]}) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:48 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r1, &(0x7f0000006700)=[{{0x0, 0x0, &(0x7f0000001400)=[{0x0}], 0x1}, 0x8}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x1dd04d7dd8138bdc, 0x0) tkill(r0, 0x11) syz_open_procfs(0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r3 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000100)) setsockopt$inet_mreqn(r3, 0x0, 0x7946e98e718f4413, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000100)) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r4 = creat(&(0x7f0000000380)='./file0\x00', 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f0000000200)={@mcast1}, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r5, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) r6 = socket$inet(0x10, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') r7 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x7946e98e718f4413, &(0x7f0000000280)={@multicast2, @remote}, 0xc) dup(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bb40)={{{@in6=@local, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f000000bc40)=0xe8) wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') r8 = creat(&(0x7f0000000380)='./file0\x00', 0x0) dup(r8) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') dup(0xffffffffffffffff) getdents64(r9, 0x0, 0x227) 14:12:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:12:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000)=0x2, 0x4) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2358.555726][T21850] input: syz1 as /devices/virtual/input/input20 14:12:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:12:49 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000200)={@broadcast, @link_local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="4ba287c97f37", @initdev={0xac, 0x1e, 0x0, 0x0}, @link_local, @broadcast}}}}, 0x0) 14:12:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) [ 2358.903585][T21971] input: syz1 as /devices/virtual/input/input21 14:12:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nfc_llcp(r2, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)="12f8aab4e32182a1a1f4cc7021087b6979c7807d", 0x14}, {&(0x7f0000000440)="63ed79b1e1b024bdb3d2cef8a8ab8556c0cc8083c1425ab319ebf210843c67f455dd2b38275e388a255f0229651d8f7580bdcaf851bf9ed99c7ae73c98ceac33183493b5c18c6f3f708ac1488a3c57a8fe2eba01adb996fc2e6426db2de34fb6ca6461be11cd60638194e83aa3101e4e0c5f73b8139c890c69278ea93efac8ea33bcbcb03edf034589546e610e85d7898b6328fae7e95f0d8a559b064fa4df959391f92ba80690ac0867acc5", 0xac}, {&(0x7f0000000540)="85", 0x1}], 0x3}, 0x8081) 14:12:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) [ 2359.270255][T22037] input: syz1 as /devices/virtual/input/input22 14:12:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) setpgid(0xffffffffffffffff, r3) 14:12:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:52 executing program 5: ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) sysinfo(&(0x7f00000007c0)=""/154) pipe(0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000006c0)={0x0, 0xfffffffffffffffd, 0x0, 0x0}) request_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, &(0x7f00000009c0)=""/225) ioctl$NBD_DO_IT(r0, 0xab04) 14:12:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:12:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:12:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x10, 0x2000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@empty, 0x0, 0x32}, @in6=@remote}}}, 0xf8}}, 0x0) 14:12:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x10) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x100, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x7fff, 0x101000) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x2, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="148ca67dbe031409cb5211", @ANYRES16=r4, @ANYBLOB="1000000000000000000014000000"], 0x14}}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x76, &(0x7f00000000c0)={r8}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r8, 0x7f}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000240)={r9, 0x20}, &(0x7f0000000380)=0x8) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x38000100}, 0xc, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="cc0100a2", @ANYRES16=r4, @ANYBLOB="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"], 0x1cc}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:12:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x10, 0x2000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:12:52 executing program 5: 14:12:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e4015", 0x8f, 0x10000}], 0x0, 0x0) 14:12:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x10, 0x2000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2362.395699][T22266] input: syz1 as /devices/virtual/input/input26 14:12:53 executing program 5: 14:12:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, 0x0, 0x0) 14:12:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e4015", 0x8f, 0x10000}], 0x0, 0x0) 14:12:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2362.761207][T22289] input: syz1 as /devices/virtual/input/input27 14:12:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, 0x0, 0x0) 14:12:55 executing program 5: 14:12:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e4015", 0x8f, 0x10000}], 0x0, 0x0) 14:12:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x52f841) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x204000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400000, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r5, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r5, r6, 0x0, 0x7ffff000) ioctl$EVIOCGPHYS(r6, 0x80404507, &(0x7f0000000780)=""/183) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7f) 14:12:56 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") close(r0) 14:12:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, 0x0, 0x0) [ 2365.446621][T22316] input: syz1 as /devices/virtual/input/input28 14:12:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000000)={0x0, 0x45}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:56 executing program 3: ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 14:12:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b", 0xa7, 0x10000}], 0x0, 0x0) 14:12:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 14:12:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x1d7, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001a000101cc499300650000a9000200f0e99049706387001a00000000023e95611ee43534b4ed500151ff07000073273d1017c856dab96957a089e2200900000000000000dddd5b92e03e10292503a532e07cee00"/97], 0x14}}, 0x0) r1 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:12:56 executing program 3: ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 14:12:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 14:12:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b", 0xa7, 0x10000}], 0x0, 0x0) 14:12:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:56 executing program 3: ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 14:12:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 14:12:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b", 0xa7, 0x10000}], 0x0, 0x0) 14:12:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 14:12:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'batadv0\x00', 0x200}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00\x06\bz\x00\x00\x00\xfd\x00', 0xf7fffffffffffffd}) 14:12:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) [ 2368.720401][T22585] device batadv0 entered promiscuous mode [ 2368.731577][T22585] 8021q: adding VLAN 0 to HW filter on device batadv0 14:12:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 2368.793113][T22585] device batadv0 left promiscuous mode 14:12:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e", 0xb3, 0x10000}], 0x0, 0x0) 14:12:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000000)={0x8001, 0x40}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@local, @multicast1}, 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) gettid() ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f0000000080)=0x6) ptrace$cont(0x9, r0, 0x0, 0x0) 14:12:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) 14:12:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) 14:12:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = getpid() wait4(r0, &(0x7f0000000000), 0x40000000, 0x0) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:12:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e", 0xb3, 0x10000}], 0x0, 0x0) 14:12:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:12:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:12:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) 14:13:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) r0 = gettid() tkill(r0, 0x37) 14:13:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e", 0xb3, 0x10000}], 0x0, 0x0) 14:13:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) 14:13:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:13:00 executing program 5: socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00006cdffb), 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x111200, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/null\x00', 0x800, 0x0) unlinkat(r1, 0x0, 0x200) fcntl$dupfd(r1, 0x406, r1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000700)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000400}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x40, r2, 0x108, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x64d}]}]}, 0x40}}, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}}, 0xf8}}, 0x0) 14:13:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000000)={0x9, 0x2000}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:13:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{0x0}], 0x1}, 0x0) 14:13:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c0", 0xb9, 0x10000}], 0x0, 0x0) 14:13:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:13:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={r2, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x98) 14:13:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)}], 0x1}, 0x0) [ 2372.310290][T22879] input: syz1 as /devices/virtual/input/input32 14:13:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c0", 0xb9, 0x10000}], 0x0, 0x0) 14:13:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:13:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, r2, 0x1133, 0x0, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x5, @media='eth\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40008) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000340)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002880)={0x14}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x6, 0x0, 0x0, 0x0, 0x7, 0x9b6}}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x2010000) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) 14:13:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)}], 0x1}, 0x0) [ 2372.617497][T23000] input: syz1 as /devices/virtual/input/input33 [ 2372.805727][T23009] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.5'. 14:13:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c0", 0xb9, 0x10000}], 0x0, 0x0) 14:13:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:13:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)}], 0x1}, 0x0) 14:13:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, r2, 0x1133, 0x0, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x5, @media='eth\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40008) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000340)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002880)={0x14}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x6, 0x0, 0x0, 0x0, 0x7, 0x9b6}}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x2010000) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) 14:13:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000000)={{0xfffffffffffffffd, 0x0, 0x7, 0x7, 0x7}, 0x3ff, 0x2}) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$RTC_WIE_ON(r4, 0x700f) ptrace$cont(0x9, r0, 0x0, 0x0) 14:13:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e2800", 0x26}], 0x1}, 0x0) [ 2375.386750][T23128] input: syz1 as /devices/virtual/input/input34 [ 2375.417499][T23122] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.5'. 14:13:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987", 0xbc, 0x10000}], 0x0, 0x0) 14:13:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, r2, 0x1133, 0x0, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x5, @media='eth\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40008) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x500) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000340)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002880)={0x14}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x6, 0x0, 0x0, 0x0, 0x7, 0x9b6}}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, 0x0, 0x2010000) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) 14:13:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:13:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e2800", 0x26}], 0x1}, 0x0) 14:13:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987", 0xbc, 0x10000}], 0x0, 0x0) [ 2375.817279][T23353] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.5'. 14:13:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e2800", 0x26}], 0x1}, 0x0) 14:13:06 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write(r0, &(0x7f0000000040)="bd38832aa0da3ed709249f2c8e21", 0xca) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2040, 0x0) 14:13:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x2, 0x0, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) 14:13:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987", 0xbc, 0x10000}], 0x0, 0x0) 14:13:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 14:13:09 executing program 4: syz_emit_ethernet(0x60, &(0x7f0000000500)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x2a, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x58, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, [], @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [{}]}}}}}}, 0x0) 14:13:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000002640)=[{&(0x7f0000000240)=@abs, 0x6e, 0x0}], 0x1, 0x20004000) 14:13:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x7, 0xdcb, 0x9, 0x0, 0x1f, 0x88800, 0x0, 0xfffffffffffff654, 0x8, 0x2, 0x5, 0x5, 0x1, 0x1, 0x4, 0x8000, 0x8, 0x2b, 0x2f6, 0x510, 0x0, 0xd2c, 0x4, 0x3, 0x80000000, 0x89, 0x5, 0x7ff, 0x3, 0x2, 0x1, 0xff3, 0x33ac, 0x10000, 0xd82, 0x0, 0x7ff, 0x5, @perf_config_ext={0x80, 0x2}, 0x101d81d36089c07e, 0x2, 0xa9, 0x3, 0xfff, 0xfffffffffffff001, 0x1}, r3, 0x1, r5, 0x1) ptrace$cont(0x9, r0, 0x0, 0x0) 14:13:09 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x2, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 14:13:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x80003, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 14:13:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 14:13:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e098722", 0xbd, 0x10000}], 0x0, 0x0) 14:13:09 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 14:13:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:13:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 14:13:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") keyctl$reject(0x13, 0x0, 0x0, 0xff, 0x0) 14:13:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e098722", 0xbd, 0x10000}], 0x0, 0x0) 14:13:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:14:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) mq_timedsend(r1, &(0x7f0000000100)="cc1b74657bf3abff16ad9ac75848265d552d477762b904eb3a686d6b8c8bfd14ff3664863b6882e3f9ec5489386bbfbe6eee66cda7a3db59bd440617bcd49f27a180728f266b35b378bf1a9fc8742ee7226f0a71bd3a6029817f7e10aa362e30cd84623f5f8c15219a5be7a9d236ccab3b2f534437", 0x75, 0x9, &(0x7f0000000180)={0x77359400}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000000)={0x5, 0xf36d, [{0x7fff, 0x0, 0x9}, {0x100000001, 0x0, 0x5}, {0x8579, 0x0, 0x35cc}, {0x5, 0x0, 0x8}, {0x7fff, 0x0, 0x1f}]}) 14:14:09 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x400006102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) sendmmsg$unix(r1, &(0x7f0000002640)=[{&(0x7f0000000240)=@abs, 0x6e, 0x0}], 0x1, 0x20004000) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) 14:14:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 14:14:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000000c0)=0x101, 0x4) read(r0, &(0x7f0000000180)=""/178, 0xb2) 14:14:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:14:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e098722", 0xbd, 0x10000}], 0x0, 0x0) [ 2438.861799][T23951] input: syz1 as /devices/virtual/input/input41 14:14:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 14:14:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe}], 0x0, 0x0) 14:14:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:14:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0x35f) setuid(r2) 14:14:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe}], 0x0, 0x0) [ 2439.203327][T24173] input: syz1 as /devices/virtual/input/input42 14:14:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 2439.555981][T24285] input: syz1 as /devices/virtual/input/input43 [ 2441.185522][T24291] IPVS: ftp: loaded support on port[0] = 21 [ 2441.502928][T30974] device bridge_slave_1 left promiscuous mode [ 2441.509277][T30974] bridge0: port 2(bridge_slave_1) entered disabled state [ 2441.567454][T30974] device bridge_slave_0 left promiscuous mode [ 2441.573694][T30974] bridge0: port 1(bridge_slave_0) entered disabled state [ 2443.566725][T30974] device hsr_slave_0 left promiscuous mode [ 2443.616617][T30974] device hsr_slave_1 left promiscuous mode [ 2443.663695][T30974] team0 (unregistering): Port device team_slave_1 removed [ 2443.679629][T30974] team0 (unregistering): Port device team_slave_0 removed [ 2443.691963][T30974] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2443.732413][T30974] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2443.810364][T30974] bond0 (unregistering): Released all slaves [ 2443.905969][T24291] chnl_net:caif_netlink_parms(): no params data found [ 2443.933643][T24291] bridge0: port 1(bridge_slave_0) entered blocking state [ 2443.941038][T24291] bridge0: port 1(bridge_slave_0) entered disabled state [ 2443.948908][T24291] device bridge_slave_0 entered promiscuous mode [ 2443.956987][T24291] bridge0: port 2(bridge_slave_1) entered blocking state [ 2443.964099][T24291] bridge0: port 2(bridge_slave_1) entered disabled state [ 2443.971830][T24291] device bridge_slave_1 entered promiscuous mode [ 2443.991727][T24291] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2444.003168][T24291] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2444.024732][T24291] team0: Port device team_slave_0 added [ 2444.033456][T24291] team0: Port device team_slave_1 added [ 2444.099120][T24291] device hsr_slave_0 entered promiscuous mode [ 2444.146923][T24291] device hsr_slave_1 entered promiscuous mode [ 2444.186559][T24291] debugfs: Directory 'hsr0' with parent '/' already present! [ 2444.262056][T24291] bridge0: port 2(bridge_slave_1) entered blocking state [ 2444.269203][T24291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2444.276616][T24291] bridge0: port 1(bridge_slave_0) entered blocking state [ 2444.283678][T24291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2444.338500][T24291] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2444.353060][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2444.362856][ T9911] bridge0: port 1(bridge_slave_0) entered disabled state [ 2444.383853][ T9911] bridge0: port 2(bridge_slave_1) entered disabled state [ 2444.395660][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2444.420394][T24291] 8021q: adding VLAN 0 to HW filter on device team0 [ 2444.436013][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2444.452199][ T9911] bridge0: port 1(bridge_slave_0) entered blocking state [ 2444.459349][ T9911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2444.496265][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2444.505980][T31964] bridge0: port 2(bridge_slave_1) entered blocking state [ 2444.513108][T31964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2444.530202][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2444.554756][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2444.569839][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2444.583290][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2444.599766][T24291] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2444.618608][T24291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2444.633346][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2444.672224][T24291] 8021q: adding VLAN 0 to HW filter on device batadv0 14:14:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 14:14:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe}], 0x0, 0x0) 14:14:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400200, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000040)={0x2, 0x2}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x100005) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:14:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 14:14:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) recvmmsg(0xffffffffffffffff, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000017c0)=""/233, 0xe9}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 14:14:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) wait4(r0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) tkill(r0, 0x38) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) prctl$PR_SET_ENDIAN(0x14, 0xda5c8061527cbfcd) capset(&(0x7f0000000000)={0x20080522, r6}, &(0x7f0000000040)={0x1ff, 0xfffffffffffffff9, 0x3, 0x2, 0x2, 0x5}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000002c0)="72153b057e610ab8e4655aae0e138d327fd0b3f3646f4382398db14a8d310b4aea9e1794") ptrace$cont(0x9, r0, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = getpid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)=0x0) setpgid(r9, r10) r11 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r11, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r11, r12, 0x0, 0x7ffff000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r12, 0x40a85321, &(0x7f00000001c0)={{0x80000001, 0x6}, 'port1\x00', 0x50, 0x200001, 0xfffffffffffffffd, 0x100000000, 0x0, 0x76, 0x3, 0x0, 0x5, 0x800000000}) perf_event_open(0x0, r9, 0x4, r8, 0x102) syz_open_procfs(r9, &(0x7f0000000080)='net/ip_mr_cache\x00') r13 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r13, 0x0, 0x36, 0x400c000, &(0x7f0000000300)={0x2, 0x4e1f, @loopback}, 0x10) r14 = syz_open_procfs(0x0, &(0x7f0000000340)='net/udp\x00') sendfile(r13, r14, 0x0, 0x7ffff000) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r14, 0xc0945662, &(0x7f0000000100)={0x10000, 0x0, [], {0x1b4dd4e1ed40acc2, @reserved}}) 14:14:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 14:14:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 14:14:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10000, 0x4000) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:14:15 executing program 2: 14:14:15 executing program 4: 14:14:15 executing program 5: 14:14:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 14:14:16 executing program 2: 14:14:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 14:14:16 executing program 4: 14:14:16 executing program 5: 14:14:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 14:14:16 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") getsockname$netrom(r0, 0x0, 0x0) 14:14:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") getsockname$netrom(r0, 0x0, &(0x7f0000000140)) 14:14:18 executing program 5: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RVERSION(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="13"], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) 14:14:18 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000002c0)={0x4, @sdr}) 14:14:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) 14:14:18 executing program 2: syz_open_dev$vbi(0x0, 0x1, 0x2) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) fcntl$getownex(r0, 0x10, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200)='/dev/swradio#\x00', 0xe, 0x1) 14:14:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000"], 0x1, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) fcntl$getownex(r0, 0x10, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(0x0, 0x0, &(0x7f0000000200)='/dev/swradio#\x00', 0xe, 0x1) 14:14:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpid() r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup3(r3, r2, 0x1c0000) sendfile(r5, r6, &(0x7f0000000080), 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r7) r8 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff6920, 0x200) r9 = getpgid(0x0) ptrace$getsig(0x4202, r9, 0x340f, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000004300)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf2516000000201072000c008d006f0000000000000008004000", @ANYRES32=r9, @ANYBLOB, @ANYRES32=r10, @ANYBLOB="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"/588, @ANYRES32=r9, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r9, @ANYBLOB="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"], 0x9}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0xd7f7d4a, 0x9, &(0x7f0000004140)=[{&(0x7f0000000380)="e384e770e0210417e986e5a6f5f5eeea5e4ff1a3128bbff84e67351d730bbf6ac4bba6f326c14109cf47b11ef40d232159abd69b46b0d7", 0x37, 0x8}, {&(0x7f0000000400)="3dc782782f71b06e6ffc7cdec6ab30", 0xf, 0x7fffffff}, {&(0x7f0000003e00)="33828a2685746150fcf1a2b78f16c2ac7c48441de78d3b72e954a6f32ceb824af020944a88b37551b45e269aefa69ae3d987d4da1c44f451c931d22009d2add13681b579a9b7aad3313ad01009117e51aab64d83a51ca04db07f317ecd6e184c85f4341d647e683f414404e330aff28705ce2f3af3765ae3bede025702368c8d98add26d662b2cc8ce4db3715ca548697625f391a3981e60d737589b883b41406717cc05a01885ab8be2", 0xaa, 0x1}, {&(0x7f0000000440)="b0ae74b4a35ed62578f30543d0333d8fe2cc7a49", 0x14, 0x1f}, {&(0x7f0000003ec0)="76f4eff10ceeac1161cb8f9bf6b336c9ee9e03f1105daccd83c4fc1c2529120e4d0237d9f128e7f6ec8a06bec0a08d526cc20d5d07097e4a416f8582210568c7faadea0ead6ee1f191964f499f6a36aa07e7780cfe3c0e36e02479", 0x5b, 0x100}, {&(0x7f0000003f40)="e459e6d4b0bb0ceeab928c28943ceead21ab25cd013b73ef64fb06bcf62d99b3ceac7b8882d591091eeec42190a8fdb001bb53bdee29c418df01f5cfaacd9c0b4e4e9272cbbbaae6b18a1367d90ae6c05beb6370325d0f29505a1a5d00205319db6c78c778c841671f6f7f339ef020a829943a", 0x73, 0x870}, {&(0x7f0000003fc0)="8baba533a6b392ea07e9d174877319a183bb3f8c5f00f58b624adbffa1688b0671baba85a9c2d1fba90ee1b69e1d6c2471544ea27f7698b1670e3f158b1e99e3e8053d0e08af202952fef18d8679cb577eb6d0874f99f02931c2ea43a8116d7471daf6e3", 0x64, 0x5}, {&(0x7f0000004040)="d213a87b52baa53975e38c55fd51011404465e5c6b49f14854b05a02430346d26c854579e1ffdfcec79bd894e4ed838f67db033c9704386a8ce75656205ffa66f9c6b20f6629b024da5421ddd97fc733c0ae0487cd0df042cde9498e2fd77d6a0b0cec78199bee3055d60207c3801ad180a130ae4bb391bb9b783058c2fb8ee14a5a2cc72f36a108938523229aa90312772881fd8449a76e2bceb1db00d343a315c918f8d1ea80dfc398251cd12c4ceeb5a53765a1a651ea7a7fd55ad849414d3201d8f5199f1e8d27ecd4ee9ac9f7c252124366d69a9647df451894f9899f67da9dc760", 0xe4, 0x3}, {&(0x7f00000004c0)="35cbb534598d8ad649a16b2e64453cf3f7c64faab6ef867945aa0353a7712d5a", 0x20, 0x34dd30d1}], 0x1000000, &(0x7f0000000100)=ANY=[@ANYBLOB='nls=macromanian,umask=01777777777777777700001,gid=', @ANYRESHEX=r11, @ANYBLOB="2c66697361626c655f7370617273653d7965732c66736d616769643d3078303030303030303030303010383030302c646f6e745f686173682c646566636f6e746578743d757365725f752c61707072616973655f747970653d696d617369672c0016bcb51cdca8e26e2e29321eb7aa913e387ec8bb2fda08c79235e0c7e82407a2a8198f4f7188af28dcf16fc319d58e4cba801f455f3c4ae538b1f8f6ad47a8bc123dd82da9c174ff7f365617367f13529424b81446983561ed137ccf2626678686efe78961ef2c759a0ec2e15730a13014606e503d150a823e5283c4d412f8effba2db288d343fe20ca1c9d99f13f40dbfd742ef9b79"]) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={r7, r10, r11}, 0xc) ptrace$cont(0x9, r0, 0x0, 0x0) 14:14:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000d06000), 0x4) mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) 14:14:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) 14:14:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$void(r0, 0x5451) r2 = gettid() wait4(0x0, 0x0, 0xc0800009, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 14:14:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002880)={[{@quota_account='quota=account'}, {@noloccookie='noloccookie'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2448.605071][T24774] overlayfs: conflicting lowerdir path [ 2448.659232][T24772] overlayfs: conflicting lowerdir path 14:14:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) [ 2448.802136][T25156] gfs2: not a GFS2 filesystem 14:14:19 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2ee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x102, 0x20) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0xc05c6104, 0x0) connect$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e21, @dev}, 0x10) write(r3, &(0x7f0000000340), 0x3e341e30) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x4}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000240)='./file0/file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) open(0x0, 0x0, 0x4) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) 14:14:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x3d, 0x1, @thr={&(0x7f0000000000)="f577e54448051fdd37f8639246a885ed67e3ed37195415351fbd3318971e14242fd45119be463aa724ddff6be96965e47c96809d10eccd86c237", &(0x7f0000000100)="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"}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x1000) shmdt(r1) ptrace$cont(0x9, r0, 0x0, 0x0) 14:14:19 executing program 2: syz_open_dev$vbi(0x0, 0x1, 0x2) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="02000000"], 0x2, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200)='/dev/swradio#\x00', 0xe, 0x1) 14:14:19 executing program 3: syz_open_dev$vbi(0x0, 0x1, 0x2) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="02000000"], 0x2, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) fcntl$getownex(r0, 0x10, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x1) 14:14:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 14:14:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x2, [0x0, 0x0, 0x0, 0xfc000000]}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) 14:14:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) r3 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924924924924f0, 0x0) getsockname(r3, &(0x7f0000000100)=@ipx, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) getpid() setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:14:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) [ 2449.297950][T25490] Enabling of bearer rejected, failed to enable media [ 2449.323661][T25410] overlayfs: conflicting lowerdir path [ 2449.397935][T25411] overlayfs: conflicting lowerdir path 14:14:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 14:14:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = getpid() tkill(r3, 0x9) socket(0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9, 0x0, "046dc16df0e283ea07b04d0d024cc280c91b92"}) 14:14:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:14:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_newaddr={0x17, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_BROADCAST={0x8, 0x4, @loopback}]}, 0x28}}, 0x0) 14:14:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x40) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x10803, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r3) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x2000, 0x400, &(0x7f0000000280)) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x800}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') dup3(r1, r2, 0x0) dup2(r0, r5) 14:14:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0x2, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:14:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, [0x0, 0x4]}, 0x5c) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x5000aea5, &(0x7f0000000000)) r5 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r5) gettid() bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000300)='./file0\x00', 0x110000141042, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000240)) ftruncate(r6, 0x10099b7) sendfile(r5, 0xffffffffffffffff, 0x0, 0x88000fc000000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) 14:14:22 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000100)={0xa, 0x40000000004e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xffffffffffffda9c) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:14:22 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60c22df700102100fe808900000000000000000000000000fe8000000000000000000000000000aa0000000004019078040087ae00ca83454270febb1cf6af2d6fd1f3113791dcec9b64374c0bb3ad7537c015dce442cf30d38d9cfc94335512edc7d8cfbf79aea041"], 0x0) socket$kcm(0x29, 0x4, 0x0) 14:14:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:14:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1", 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:14:22 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@remote, @in6=@mcast1, 0x0, 0x14}]}, 0x38}}, 0x0) 14:14:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:14:22 executing program 4: ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000000)={0x0, 0xfffffffffffffffe, 0x400000000, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0}, 0x10) r0 = socket$inet6(0xa, 0x3, 0x1000004000000036) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) write(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r1) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) accept$packet(r2, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000400)={'bpq0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000440)={@loopback}, &(0x7f0000000480)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) 14:14:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:14:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:14:23 executing program 4: 14:14:25 executing program 4: 14:14:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:14:25 executing program 5: 14:14:25 executing program 3: 14:14:25 executing program 0: 14:14:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) perf_event_open(0x0, r8, 0x4, r7, 0x102) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) r11 = gettid() setpgid(r10, r11) perf_event_open(0x0, r2, 0x4, r1, 0x102) r12 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000000100)={0x6, 0x70, 0xf4, 0x6, 0x6, 0x7, 0x0, 0x68b6, 0x200e8, 0x4, 0x4, 0x18e, 0x3, 0x4, 0x1, 0x6, 0x1ff, 0x4, 0x7, 0x1000, 0x1000, 0x5, 0x19d, 0x1d8, 0x20, 0x4, 0x6d, 0x8, 0x7fff, 0x7f, 0x278, 0x2, 0x8, 0x4dac, 0x0, 0x16c4, 0x400, 0x5, 0x0, 0x2, 0x1, @perf_config_ext={0xe8, 0xfffffffffffffffd}, 0x81, 0x9, 0x89b5, 0x7, 0x100000000, 0x7, 0x6}, r2, 0xc, r12, 0xa) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r13 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_MODULATOR(r13, 0x40445637, &(0x7f0000000040)={0x700000000000000, "c2e6955650f7b420cae08303ec512648cff19524090934a8e85ff1f44332783f", 0x20, 0x8001, 0x9, 0x1d, 0x5}) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r14 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r14, 0x0, 0x0) tkill(r14, 0x38) ptrace$cont(0x18, r14, 0x0, 0x0) ptrace$setregs(0xd, r14, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r14, 0x0, 0x0) r15 = socket$inet_tcp(0x2, 0x1, 0x0) r16 = getpid() ioctl$sock_SIOCGPGRP(r15, 0x8904, &(0x7f0000000280)=0x0) setpgid(r16, r17) ptrace$peekuser(0x3, r17, 0x5) 14:14:25 executing program 5: 14:14:25 executing program 3: 14:14:25 executing program 4: 14:14:25 executing program 0: 14:14:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:14:26 executing program 3: 14:14:26 executing program 5: 14:14:26 executing program 0: 14:14:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) 14:14:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:14:26 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000180)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x18, 0x3b, 0x0, @remote={0xfe, 0x80, [0x29c, 0x58, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, [], @loopback}}}}}}, 0x0) 14:15:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:26 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000240)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x3, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) 14:15:26 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:15:26 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000089c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2a) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x7, 0x10000, 0x9}) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000000200fd000005"], 0x49}}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:15:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0xfefe) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0xffe) 14:15:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915", 0x58}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0xfefe) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0xffe) 14:15:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x15, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x5, &(0x7f0000000100)=@framed={{0x18, 0xf}, [@map={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:15:27 executing program 4: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xb3c111c) unlink(&(0x7f0000000180)='./file0\x00') r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000140)={0x10001, 0x2}) clone(0x1000000000007ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r3, r2, 0x0, 0x100000002) 14:15:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0), 0xfefe) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0xffe) 14:15:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x0, 0x0, 0x20}, {0x0, 0x0, 0x9}]}) fchdir(r1) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000140)="73844ae89d", 0x5}]) 14:15:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="5f454c44065b05007311625b1e43f0010bf32b9a993b89725d4d1c31090000173bd22023eb2be30c77a0ba068c2b206431cbfabdf1ba04fb7e92c1dda2de803ddf1eb6e00100db10c8203b9befd204603766a143dc457298a4a0c40bfdb8d13171c4ff9b9ff17bcb4a1ddd393d50a7b4eb3fc3df94dc8e42f51dd40bdfd0684338e5e5a9b74d227d2fd2348f3910f0b567feab1024e5545c8e2f4fb2b1f87dae230104000051e6705ef4c96aeead00000000ce7009d0d35c7dfaeaa17a06888a95e80990595c5a0920d575791269d11760ba875795a88660dd94f057ef3fbd2b6d42b0fc33c8ddb8b5bb25d4f3cf8a7893f33f709a6d9be460643177d009a08dfeb8dd9d8d1bd0fb35ced45262208b9fa230662bb571a322180a52fde0d66ba36c2f336d040ada505673e79f2fa40a16"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000000000)) splice(r1, 0x0, r3, 0x0, 0x4f20, 0x0) [ 2518.087713][T24174] device bridge_slave_1 left promiscuous mode [ 2518.094008][T24174] bridge0: port 2(bridge_slave_1) entered disabled state [ 2518.177520][T24174] device bridge_slave_0 left promiscuous mode [ 2518.183758][T24174] bridge0: port 1(bridge_slave_0) entered disabled state [ 2520.016727][T24174] device hsr_slave_0 left promiscuous mode [ 2520.056590][T24174] device hsr_slave_1 left promiscuous mode [ 2520.105790][T24174] team0 (unregistering): Port device team_slave_1 removed [ 2520.119308][T24174] team0 (unregistering): Port device team_slave_0 removed [ 2520.130450][T24174] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2520.172531][T24174] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2520.243197][T24174] bond0 (unregistering): Released all slaves [ 2520.357804][T27103] IPVS: ftp: loaded support on port[0] = 21 [ 2520.437556][T27103] chnl_net:caif_netlink_parms(): no params data found [ 2520.470133][T27103] bridge0: port 1(bridge_slave_0) entered blocking state [ 2520.477400][T27103] bridge0: port 1(bridge_slave_0) entered disabled state [ 2520.485072][T27103] device bridge_slave_0 entered promiscuous mode [ 2520.493051][T27103] bridge0: port 2(bridge_slave_1) entered blocking state [ 2520.500231][T27103] bridge0: port 2(bridge_slave_1) entered disabled state [ 2520.508167][T27103] device bridge_slave_1 entered promiscuous mode [ 2520.576647][T27103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2520.589150][T27103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2520.611563][T27103] team0: Port device team_slave_0 added [ 2520.618993][T27103] team0: Port device team_slave_1 added [ 2520.699395][T27103] device hsr_slave_0 entered promiscuous mode [ 2520.776801][T27103] device hsr_slave_1 entered promiscuous mode [ 2520.926514][T27103] debugfs: Directory 'hsr0' with parent '/' already present! [ 2520.952683][T27103] bridge0: port 2(bridge_slave_1) entered blocking state [ 2520.959839][T27103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2520.967266][T27103] bridge0: port 1(bridge_slave_0) entered blocking state [ 2520.974324][T27103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2521.050007][T27103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2521.071742][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2521.083717][T31964] bridge0: port 1(bridge_slave_0) entered disabled state [ 2521.095599][T31964] bridge0: port 2(bridge_slave_1) entered disabled state [ 2521.117974][T27103] 8021q: adding VLAN 0 to HW filter on device team0 [ 2521.138676][T31964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2521.155226][T31964] bridge0: port 1(bridge_slave_0) entered blocking state [ 2521.162374][T31964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2521.193034][T12513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2521.205487][T12513] bridge0: port 2(bridge_slave_1) entered blocking state [ 2521.212620][T12513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2521.244842][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2521.255274][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2521.271949][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2521.291851][T27103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2521.313210][T27103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2521.324064][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2521.339836][ T9911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2521.362592][T27103] 8021q: adding VLAN 0 to HW filter on device batadv0 14:15:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) 14:15:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto$unix(0xffffffffffffffff, &(0x7f0000000500)="1065ce5e0de5be30d96b998c149e6483e6358b51f5d561113445ec34769547005b874b01bef6d5a179ba9f754bba6d7a9033bbece7f2538a81e6a8d5541c020d48b0bfc912672dd9cd686f6227ab63e0c6e6b899d66d730d18c037f974c81b96203ec9a6d9346c7d43014f14817792365f0d3a9a25c81efc0a8ef3ce08e8df4b2fcfdd886da004e18bcda83e942f16783ac3f9d97463741aa16c141d880ac95b1f4eb9e7448d6b1572f2875ba101bfe4fa7a262a687860cd4bd6181a75d78b62e719dab459b4608f40dc37c5a2d2bc969b252f7e0b434a8558e9634aa22bd02fc92e6ad2d103f440aa8d0d4827133d38e8a701b2b0b6bdc429b5a6ddd2d82521e83a0997ec9c0a6668c9c87f65cf4f0d7afb8650899f2d85646b34e3adfaeca9f68d771a2b385e35e294d43ed361efbc1c2625efd8cd85a3d381b2762eb73a959ccfb41adde054eab6f5a947b32e4a031a0eb6bae211bd9583a05d5c5b2f6f7d7e59e3659e1323cc88afa768d2526c04b67f0361a9a0c96ce2770893fcdee50db09f5027907370c93abf371f87105c5160e2ee87b79d81fa2a3b383f41485cc6339a65a39a7e1bf51b0e01d66204cd31324c7dabf687c3c61a5ec4730abff154fb1159f4038be8cacfe5f3481ae0b96871e5529eb3df838e7b6193b41d3b5b6c78afccf006b0a68fb28bc4bd3c469dbdd7f8ab7767645f97e3a5d71086cebd9c4cb04354c47608d2af3aadffc9d7d45f0385b75c92e3e9f4d5be80b196b2343b3afa80a4fc046075508aa81fd44f4ab0bbd4566485c26ec78e07ce4eeb82e04aad79f3f37ee52ffde44235b602fce89a3e2a2abafc50f3e66448702bd962fb5b69e86dc3a0a04197011d2d72fbbfb355b209abd93bff24571275e41efd1952c78c0180c1587e41422782ed544d695976406b8b3819e4fef1b0e2958c3c8a1ea40220ab01eee5774e63999d60eaa42822acec343b100d8c34b55207759f7e9aee6ffcf357df630407c7697345eb9df5506136ac7ebd2187f358c3b4fc31f92be9374e6dc03eb8c10f5b24a028e333b3952f728941547bcb48fcc7a94cc706a1bd0c90dfef05d279d1896a01781145b3b71773dbabcc244354a9c85423d6543abb79dd391111f3722ad00d8423835349cf606a798ce84789b95fb4d44a4aa57f14de26a72868790319549b4ff66228bac8f2af2ba3aa3baa59b28b1f088f271ed0d448c1165607b75bb02cc8d6fb286f7656ef39f662cd26a6023500db6de769a9e32923d6119a3506ece6b3b780edd56feeb2f0588fdd2214c4d9f91b0b87fff646f58669186ecfb4e75a2a48ba878d38b3b9da8e12ab7afbeec0f6f9905921a67c9051d34f33da15e35dbbd9c80b82506d725d9cf7a8d0e67fcffd6f24d1aaa5efb25e3df22debc2b390e33b0c8d4b8bcb25d5255dc0b2eb4b9463e17040f9e730951524c07070e656fd9e0c509537d4098a3cd676c898942f4edd0c37039aaec87068de37b5ef133a9d106e0390bcaca0cb7cedf19482ed8b64c1a15edfbfc17f2d5b7f3c8ed63c4423711190e863560c899d0e8cc711e6be2bacd6c41fc507793504ef19b20e5993608ae8e0638721568ca454fa40fb8c1a31de5f883063aa71d79435fac3437730aa55d52ab797247e3a8ea8998061c30dbb349f39603783e9e1a56e3ebfda0756fa8ffb18f3213d2070b082b90c5433fd588603abb6e3f721217c7b2f54437c181c32f1b843afd4b027698dd3738bec8ac87bb9f31bd30f52ed34b51b38ebf7696c244ad97e47eb117bea7721f11e9ba5481d1fc52b324dab7727c40ad40e1685e8f44e869962a6d364d126324ca426395e733e8aeb83a6d1fde11c397bd05ffea393c9aa2c53fbe574ef25ffbfa948d7ee9941682f79f3fa0e8cbba5b2a4dd122c8da5d41274ef34096eb0fa07d7d303ee6f391832a66fe7ec79a3e006999b50c0a4be1b78d6dc7a54e0d1145d06b721e884603c1b1f00ff8f9eb5486c6acc9a9e5461b2d100c414ea637c7c847ca22b05f5a07aaacb764b2562f7229c99b65f5db197c8f4292a32148450aae8198d9276021f2236c4f685e287068971680460c62e822c1b2c3ae65a18df4955fa45b219f7a0d922ed92fed3fe7a28087a78d33e7ffba6c98bc2c14346c4933d", 0x5f6, 0x0, 0x0, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/dev_mcast\x00') read(r1, &(0x7f0000000040)=""/230, 0x1c02fa81) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000004c0)=',') 14:15:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) prctl$PR_SET_PDEATHSIG(0x1, 0x0) fremovexattr(0xffffffffffffffff, 0x0) symlink(0x0, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(0x0) clock_gettime(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) dup(0xffffffffffffffff) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fstatfs(r3, &(0x7f0000001340)=""/4096) mkdirat(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setsockopt$sock_timeval(r4, 0x1, 0x42, 0x0, 0xffffffffffffffa2) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x20) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1, &(0x7f0000000040)="11dc24c93d") shutdown(0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xffffffffffffff04) poll(0x0, 0xffd8, 0x0) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'lo\x00', 0x800}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r7 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r7, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xb50) 14:15:35 executing program 3: 14:15:35 executing program 0: 14:15:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x6d, 0x2}, 0x7) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 14:15:35 executing program 0: 14:15:35 executing program 3: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff7da) mknod(&(0x7f0000000140)='./file0\x00', 0x1142, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) prctl$PR_GET_TIMERSLACK(0x1e) ptrace(0x11, r0) [ 2524.593572][T27125] tmpfs: Unknown parameter ' syz_tun 1 0 01005e000001 [ 2524.593572][T27125] 11 syz_tun 1 0 3333ffaaaaaa [ 2524.593572][T27125] 3 gre0 1 0 e0000001 [ 2524.593572][T27125] 28 bridge_slave_1 1 0 333300000001 [ 2524.593572][T27125] 28 bridge_slave_1 1 0 01005e000001 [ 2524.593572][T27125] 28 bridge_slave_1 1 0 3333ff496995 [ 2524.593572][T27125] 20 batadv0 1 0 333300000001 [ 2524.593572][T27125] 20 batadv0 1 0 01005e000001 14:15:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) 14:15:35 executing program 4: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000100)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000200)='./file0\x00', 0x0) gettid() ptrace(0x11, r0) [ 2524.593572][T27125] 20 batadv0 1 0 3333ff000028 [ 2524.593572][T27125] 20 batadv0 1 0 3333ffaaaa28 [ 2524.593572][T27125] 24 veth1 1 0 333300000001 [ 2524.593572][T27125] 24 veth1 1 0 3333ff000019 [ 2524.593572][T27125] 24 veth1 1 0 01005e000001 [ 2524.593572][T27125] 24 veth1 1 0 3333ffaaaa19 14:15:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x1ae) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x2, 0x0, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, 0x0) 14:15:35 executing program 0: 14:15:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) 14:15:35 executing program 3: 14:15:35 executing program 0: 14:15:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) 14:15:35 executing program 4: 14:15:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$pokeuser(0x6, r0, 0x0, 0xa3) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:38 executing program 0: 14:15:38 executing program 3: 14:15:38 executing program 5: 14:15:38 executing program 4: 14:15:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) 14:15:38 executing program 0: 14:15:38 executing program 3: 14:15:38 executing program 5: 14:15:38 executing program 4: 14:15:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) 14:15:38 executing program 3: 14:15:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000070085000000370000009500000000000000"], &(0x7f0000000040)='GPL\x02', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:15:41 executing program 0: 14:15:41 executing program 5: 14:15:41 executing program 3: 14:15:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff}, 0x20) 14:15:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:41 executing program 0: 14:15:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:41 executing program 5: 14:15:41 executing program 3: 14:15:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000070085000000370000009500000000000000"], &(0x7f0000000040)='GPL\x02', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:15:41 executing program 0: 14:15:41 executing program 4: 14:15:41 executing program 0: 14:15:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:41 executing program 3: 14:15:41 executing program 5: 14:15:41 executing program 1: 14:15:41 executing program 4: 14:15:41 executing program 0: 14:15:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(0xffffffffffffffff, r2, &(0x7f0000000000), 0xffe) 14:15:41 executing program 3: 14:15:41 executing program 5: 14:15:41 executing program 1: 14:15:42 executing program 0: 14:15:42 executing program 4: 14:15:42 executing program 5: 14:15:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(0xffffffffffffffff, r2, &(0x7f0000000000), 0xffe) 14:15:42 executing program 3: 14:15:42 executing program 1: 14:15:42 executing program 4: 14:15:42 executing program 0: mknod(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./file1\x00', 0x56f74ba32ba4f2f2) close(r0) execve(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = creat(&(0x7f0000000240)='./file1\x00', 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000640), 0x8) 14:15:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, 0x0) 14:15:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r2, &(0x7f0000000640)=[{&(0x7f0000000080)=""/53, 0x35}], 0x1) write$P9_RSTATu(r1, 0x0, 0x0) 14:15:42 executing program 3: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000004c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) write$P9_RAUTH(r1, 0x0, 0xd) 14:15:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) 14:15:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(0xffffffffffffffff, r2, &(0x7f0000000000), 0xffe) 14:15:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:15:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d010000000000e4ffffff000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000", 0x3d, 0x10000}], 0x0, 0x0) 14:15:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default}) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) perf_event_open(0x0, r4, 0x4, r3, 0x102) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) perf_event_open(0x0, r8, 0x4, r7, 0x102) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:15:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0x42}, {&(0x7f0000000200)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c15645b6855c6f551ee56842ec4f7d7c23e3ae", 0xe5}], 0xf92b489, 0x6) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) perf_event_open(0x0, r2, 0x4, r1, 0x102) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) prctl$PR_SET_PTRACER(0x59616d61, r9) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r10 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x38) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$KDGKBMODE(r11, 0x4b44, &(0x7f0000000100)) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r10, 0x0, 0x0) r12 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r13 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r12, r13, 0x0, 0x7ffff000) setsockopt$inet_tcp_int(r13, 0x6, 0x6, &(0x7f0000000000)=0xcf3, 0x4) 14:15:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default}) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) perf_event_open(0x0, r4, 0x4, r3, 0x102) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) perf_event_open(0x0, r8, 0x4, r7, 0x102) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:15:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:15:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) setpgid(r2, r3) perf_event_open(0x0, r2, 0x4, r1, 0x102) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) prctl$PR_SET_PTRACER(0x59616d61, r9) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r10 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x38) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$KDGKBMODE(r11, 0x4b44, &(0x7f0000000100)) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r10, 0x0, 0x0) r12 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r13 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r12, r13, 0x0, 0x7ffff000) setsockopt$inet_tcp_int(r13, 0x6, 0x6, &(0x7f0000000000)=0xcf3, 0x4) 14:15:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0x42}, {&(0x7f0000000200)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c15645b6855c6f551ee56842ec4f7d7c23e3ae", 0xe5}], 0xf92b489, 0x6) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20040, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000100)=""/136) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0x42}, {&(0x7f0000000200)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c15645b6855c6f551ee56842ec4f7d7c23e3ae", 0xe5}], 0xf92b489, 0x6) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2532.702289][T28277] ptrace attach of "/root/syz-executor.1"[28265] was attempted by "/root/syz-executor.1"[28277] 14:15:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default}) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) setpgid(r4, r5) perf_event_open(0x0, r4, 0x4, r3, 0x102) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = getpid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000280)=0x0) setpgid(r8, r9) perf_event_open(0x0, r8, 0x4, r7, 0x102) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 14:15:43 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r0, r2, &(0x7f0000000000), 0xffe) 14:15:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4", 0x6e}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:15:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setregs(0xf, r3, 0x0, &(0x7f0000000100)="0c49c71eeb68c0991b08dcdb44b4551aaace72d343e1c5d7172f8fed6b1db991a69ce976e2bcd0a279020b93cc82b4e8b6a241cf2428635b1faebe56d369fe4acdabfd3fef6cafd58305bb882cf846eff5e400ddc91e978b96ca322252012f15a13fb8fc52707f028420deeccd0b9d2c38e952a800da64975018d318b50362450824210009e28c1cb847776cbf9720185761f67f227246") r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) pwrite64(r9, &(0x7f0000001540)="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", 0x105d, 0x0) tkill(r8, 0x38) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = getpid() ioctl$sock_SIOCGPGRP(r10, 0x8904, &(0x7f0000000280)=0x0) setpgid(r11, r12) r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = getpid() ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000280)=0x0) setpgid(r15, r16) perf_event_open(0x0, r15, 0x4, r14, 0x102) r17 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) perf_event_open(0x0, r15, 0x3, r17, 0x102) r18 = gettid() tgkill(r11, r18, 0x4) ptrace$cont(0x9, r8, 0x0, 0x0) 14:15:43 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r2, 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f00000000c0)={0x2, 0x4, 0xffffffffffffffff, 0x101}) r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x400) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000200)={0x3, "b28f6eba5bd1e3cb464c102fffd24d7c574dcc6c2177f0ef14ac2c6e7e6d2cfc", 0x2, 0x40, 0x1000, 0x89, 0x9, 0x0, 0x40, 0x7}) r4 = socket$nl_crypto(0x10, 0x3, 0x15) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000280)=0x0) setpgid(r7, r8) perf_event_open(0x0, r7, 0x4, r6, 0x102) r9 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff6920, 0x200) r10 = getpgid(0x0) ptrace$getsig(0x4202, r10, 0x340f, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000007c0)=ANY=[@ANYBLOB="00000000100000022cbd7000fbdbdf25167be600201072000c008d006f0000000000000008004000", @ANYRES32=r10, @ANYBLOB, @ANYRES32=r11, @ANYBLOB="54022000aa485f3f6e543b6897a9102ef95b3ef91188d2103bd221bdd01230202901996317210385325cd336f19e1fa1745751ca3429896d9325c76553169d7c96a4d00d8b7855b60d88ecbf222b0dd826c54facf25c2f396246b1a0d4dc651eafe1b8f334e1736fa8f7d5034243db8d2f07f0fb8d7443ec17ab00b10bb2379f2b2b28361b76afa23f15670703b55351963bbea6fb101a2d271a1b26daec1741e409eeb6f3c0504efd7477c97117825007d87f50440a75cd27a28d652940c406676ea6ba8891d27bb1e211ed790927928342ac630f75ef5503f76d00b82eb63adbe132ec1fa907fa1bbadbd190165ab78d25eca8df088836c88503be7fcee5a41f24c4e1cbbc194bb9513e6bf9c981d6e5e967d56cb16c8544e40754868a5c7a5eefdcec84b88adf58dd9c4a838f8cbc93f583ef500ddd9e9b6ff33bd149b900b88fa07c5db0450975a851c0deb6d456df7ce2d1ff908a8e06b699878e86526726cddc30e34ef5e0be122b75c6a5c028017ed817fad51bfffca7df453ff5668819c5eb84d0787f574c1ade76b6798c0041d43842c7d43be3536d65f62f4ccf78e879e19636ae9334b8de83cacfcb2fcf47172fe391050bb191ae164e18e72b9b24f11267eb3e32bf00a53b5bef91ebc6bca1fdb51b9378b8e3c7f4aabfe7950d9f144dc0a716eaf9f33400effc498c89f5dc589a98bea652b39f7d8a2c6ba70b861ed8532866b0693ed46e75449c9fad702e1b7e70c640cb81ed09625c7ff05426e2558b1bd2eb2e29006acdae320fe45634079f9b0084fddf8a88066952caae4494959ed1861f6d08003800"/603, @ANYRES32=r10, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r10, @ANYBLOB="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"], 0x9}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) r12 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendfile(r12, r9, 0x0, 0x9) fstat(r12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={r7, r11, r13}, 0xc) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000002c0), 0x10) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x20000000000) listen(r0, 0x1a0) 14:15:43 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r0, r2, &(0x7f0000000000), 0xffe) 14:15:43 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r2, 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f00000000c0)={0x2, 0x4, 0xffffffffffffffff, 0x101}) r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x400) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000200)={0x3, "b28f6eba5bd1e3cb464c102fffd24d7c574dcc6c2177f0ef14ac2c6e7e6d2cfc", 0x2, 0x40, 0x1000, 0x89, 0x9, 0x0, 0x40, 0x7}) r4 = socket$nl_crypto(0x10, 0x3, 0x15) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000280)=0x0) setpgid(r7, r8) perf_event_open(0x0, r7, 0x4, r6, 0x102) r9 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff6920, 0x200) r10 = getpgid(0x0) ptrace$getsig(0x4202, r10, 0x340f, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f00000007c0)=ANY=[@ANYBLOB="00000000100000022cbd7000fbdbdf25167be600201072000c008d006f0000000000000008004000", @ANYRES32=r10, @ANYBLOB, @ANYRES32=r11, @ANYBLOB="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"/603, @ANYRES32=r10, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r10, @ANYBLOB="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"], 0x9}, 0x1, 0x0, 0x0, 0x841}, 0x20000000) r12 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendfile(r12, r9, 0x0, 0x9) fstat(r12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={r7, r11, r13}, 0xc) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000002c0), 0x10) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x20000000000) listen(r0, 0x1a0) 14:15:43 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:15:43 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r0, r2, &(0x7f0000000000), 0xffe) 14:15:46 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:15:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:46 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:15:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setregs(0xf, r3, 0x0, &(0x7f0000000100)="0c49c71eeb68c0991b08dcdb44b4551aaace72d343e1c5d7172f8fed6b1db991a69ce976e2bcd0a279020b93cc82b4e8b6a241cf2428635b1faebe56d369fe4acdabfd3fef6cafd58305bb882cf846eff5e400ddc91e978b96ca322252012f15a13fb8fc52707f028420deeccd0b9d2c38e952a800da64975018d318b50362450824210009e28c1cb847776cbf9720185761f67f227246") r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) pwrite64(r9, &(0x7f0000001540)="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", 0x105d, 0x0) tkill(r8, 0x38) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = getpid() ioctl$sock_SIOCGPGRP(r10, 0x8904, &(0x7f0000000280)=0x0) setpgid(r11, r12) r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = getpid() ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000280)=0x0) setpgid(r15, r16) perf_event_open(0x0, r15, 0x4, r14, 0x102) r17 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) perf_event_open(0x0, r15, 0x3, r17, 0x102) r18 = gettid() tgkill(r11, r18, 0x4) ptrace$cont(0x9, r8, 0x0, 0x0) 14:15:46 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) setpgid(r5, r6) perf_event_open(0x0, r5, 0x4, r4, 0x102) r7 = syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff6920, 0x200) r8 = getpgid(0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) ptrace$getsig(0x4202, r8, 0x340f, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r10, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r11 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r10, r11, 0x0, 0x7ffff000) r12 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r12, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r13 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r12, r13, 0x0, 0x7ffff000) r14 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r14, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r15 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r14, r15, 0x0, 0x7ffff000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000000c40)=ANY=[@ANYBLOB="d0130000100000022cbd7000fbdbdf2516000000201072000c008d006f0000000000000008004000", @ANYRES32=r8, @ANYBLOB, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYBLOB="5dfc19581a781dde6723a49aefb8ee48740b3ebe0505188e706d2a84fc6001790762e378d9f8e3019bae9a3457ef9dc07a2404be097090615239e12defa02d23ff8efe6601cefa2aa0b8bb91899741a212e53b54ab446b146e93db036d81fbd06cfb48375160e759b29da015123ca6a1fbc65ea199f6d49058bbb58ab707c10e0780017c0615ebc1d941520bd6486228", @ANYRESOCT=r12, @ANYRES64=r15], @ANYBLOB="54022000aa485f3f6e543b6897a9102ef95b3ef91188d2103bd221bdd01230202901996317210385325cd336f19e1fa1745751ca3429896d9325c76553169d7c96a4d00d8b7855b60d88ecbf222b0dd826c54facf25c2f396246b1a0d4dc651eafe1b8f334e1736fa8f7d5034243db8d2f07f0fb8d7443ec17ab00b10bb2379f2b2b28361b76afa23f15670703b55351963bbea6fb101a2d271a1b26daec1741e409eeb6f3c0504efd7477c97117825007d87f50440a75cd27a28d652940c406676ea6ba8891d27bb1e211ed790927928342ac630f75ef5503f76d00b82eb63adbe132ec1fa907fa1bbadbd190165ab78d25eca8df088836c88503be7fcee5a41f24c4e1cbbc194bb9513e6bf9c981d6e5e967d56cb16c8544e40754868a5c7a5eefdcec84b88adf58dd9c4a838f8cbc93f583ef500ddd9e9b6ff33bd149b900b88fa07c5db0450975a851c0deb6d456df7ce2d1ff908a8e06b699878e86526726cddc30e34ef5e0be122b75c6a5c0288819c5eb84d0787f574c1ade76b6798c0041d43842c7d43be3536d65f62f4ccf78e879e19636ae9334b8de83cacfcb2fcf47172fe391050bb191ae164e18e72b9b24f11267eb3e32bf00a53b5bef91ebc6bca1fdb51b9378b8e3c7f4aabfe7950d9f144dc0a716eaf9f33400effc498c89f5dc589a98bea652b39f7d8a2c6ba70b861ed8532866b0693ed46e75449c9fad702e1b7e70c640cb81ed09625c7ff05426e2558b1bd2eb2e29006acdae320fe45634079f9b0084fddf8a88066952caae4494959ed1861f6d08003800"/588, @ANYRES64=r10, @ANYBLOB="0c003a00040000000000000000000dcb081407c07302d0e74ad16789e592b1a84c57659847f7deca476616e344448849fc965e482a8d1c3d4e04a209c5df3fa6db0990297cd779094f524d719a60f651b65178dd500e3e3142280bc26d1a24356ba3a895edf6f8e8d7c6e67f213aa5ec515b2b072854f8036379b3750c006c00010001000000000008005000", @ANYRES32=r8, @ANYBLOB="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"], 0x9}, 0x1, 0x0, 0x0, 0x84050}, 0x20000000) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0xd7f7d4a, 0x9, &(0x7f0000004140)=[{&(0x7f0000000380)="e384e770e0210417e986e5a6f5f5eeea5e4ff1a3128bbff84e67351d730bbf6ac4bba6f326c14109cf47b11ef40d232159abd69b46b0d7", 0x37, 0x8}, {&(0x7f0000000400)="3dc782782f71b06e6ffc7cdec6ab30", 0xf, 0x7fffffff}, {&(0x7f0000003e00)="33828a2685746150fcf1a2b78f16c2ac7c48441de78d3b72e954a6f32ceb824af020944a88b37551b45e269aefa69ae3d987d4da1c44f451c931d22009d2add13681b579a9b7aad3313ad01009117e51aab64d83a51ca04db07f317ecd6e184c85f4341d647e683f414404e330aff28705ce2f3af3765ae3bede025702368c8d98add26d662b2cc8ce4db3715ca548697625f391a3981e60d737589b883b41406717cc05a01885ab8be2", 0xaa, 0x1}, {&(0x7f0000000440)="b0ae74b4a35ed62578f30543d0333d8fe2cc7a49", 0x14, 0x1f}, {&(0x7f0000003ec0)="76f4eff10ceeac1161cb8f9bf6b336c9ee9e03f1105daccd83c4fc1c2529120e4d0237d9f128e7f6ec8a06bec0a08d526cc20d5d07097e4a416f8582210568c7faadea0ead6ee1f191964f499f6a36aa07e7780cfe3c0e36e02479", 0x5b, 0x100}, {&(0x7f0000003f40)="e459e6d4b0bb0ceeab928c28943ceead21ab25cd013b73ef64fb06bcf62d99b3ceac7b8882d591091eeec42190a8fdb001bb53bdee29c418df01f5cfaacd9c0b4e4e9272cbbbaae6b18a1367d90ae6c05beb6370325d0f29505a1a5d00205319db6c78c778c841671f6f7f339ef020a829943a", 0x73, 0x870}, {&(0x7f0000003fc0)="8baba533a6b392ea07e9d174877319a183bb3f8c5f00f58b624adbffa1688b0671baba85a9c2d1fba90ee1b69e1d6c2471544ea27f7698b1670e3f158b1e99e3e8053d0e08af202952fef18d8679cb577eb6d0874f99f02931c2ea43a8116d7471daf6e3", 0x64, 0x5}, {&(0x7f0000004040)="d213a87b52baa53975e38c55fd51011404465e5c6b49f14854b05a02430346d26c854579e1ffdfcec79bd894e4ed838f67db033c9704386a8ce75656205ffa66f9c6b20f6629b024da5421ddd97fc733c0ae0487cd0df042cde9498e2fd77d6a0b0cec78199bee3055d60207c3801ad180a130ae4bb391bb9b783058c2fb8ee14a5a2cc72f36a108938523229aa90312772881fd8449a76e2bceb1db00d343a315c918f8d1ea80dfc398251cd12c4ceeb5a53765a1a651ea7a7fd55ad849414d3201d8f5199f1e8d27ecd4ee9ac9f7c252124366d69a9647df451894f9899f67da9dc760", 0xe4, 0x3}, {&(0x7f00000004c0)="35cbb534598d8ad649a16b2e64453cf3f7c64faab6ef867945aa0353a7712d5a", 0x20, 0x34dd30d1}], 0x1000000, &(0x7f00000042c0)={[{@nls={'nls', 0x3d, 'macromanian'}}, {@umask={'umask', 0x3d, 0xffffffffffff8001}}, {@gid={'gid', 0x3d, r16}}, {@disable_sparse_yes='disable_sparse=yes'}], [{@fsmagic={'fsmagic', 0x3d, 0x8000}}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40500, 0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={r5, r9, r16}, 0xc) listen(r0, 0x1a0) [ 2536.004875][T28349] FAULT_INJECTION: forcing a failure. [ 2536.004875][T28349] name failslab, interval 1, probability 0, space 0, times 0 14:15:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:46 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) [ 2536.101923][T28349] CPU: 1 PID: 28349 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2536.111089][T28349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2536.121154][T28349] Call Trace: [ 2536.124465][T28349] dump_stack+0x172/0x1f0 [ 2536.128823][T28349] should_fail.cold+0xa/0x15 [ 2536.133438][T28349] ? fault_create_debugfs_attr+0x180/0x180 [ 2536.139456][T28349] ? ___might_sleep+0x163/0x280 [ 2536.144335][T28349] __should_failslab+0x121/0x190 [ 2536.149304][T28349] should_failslab+0x9/0x14 [ 2536.153821][T28349] kmem_cache_alloc_node+0x268/0x740 [ 2536.159126][T28349] __alloc_skb+0xd5/0x5e0 [ 2536.163476][T28349] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2536.168599][T28349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2536.174844][T28349] ? netlink_autobind.isra.0+0x228/0x310 [ 2536.180484][T28349] netlink_sendmsg+0x972/0xd60 [ 2536.185269][T28349] ? netlink_unicast+0x710/0x710 [ 2536.190222][T28349] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2536.195773][T28349] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2536.201225][T28349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2536.201238][T28349] ? security_socket_sendmsg+0x8d/0xc0 [ 2536.201251][T28349] ? netlink_unicast+0x710/0x710 [ 2536.201266][T28349] sock_sendmsg+0xd7/0x130 [ 2536.201280][T28349] ___sys_sendmsg+0x803/0x920 [ 2536.201294][T28349] ? copy_msghdr_from_user+0x440/0x440 [ 2536.201316][T28349] ? __kasan_check_read+0x11/0x20 [ 2536.237459][T28349] ? __fget+0x384/0x560 [ 2536.241655][T28349] ? ksys_dup3+0x3e0/0x3e0 [ 2536.246094][T28349] ? __fget_light+0x1a9/0x230 [ 2536.250810][T28349] ? __fdget+0x1b/0x20 [ 2536.254907][T28349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2536.261187][T28349] __sys_sendmsg+0x105/0x1d0 [ 2536.265793][T28349] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2536.270833][T28349] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2536.270851][T28349] ? do_syscall_64+0x26/0x760 [ 2536.280970][T28349] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2536.287052][T28349] ? do_syscall_64+0x26/0x760 [ 2536.291735][T28349] __x64_sys_sendmsg+0x78/0xb0 [ 2536.296507][T28349] do_syscall_64+0xfa/0x760 [ 2536.301025][T28349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2536.306936][T28349] RIP: 0033:0x459879 [ 2536.310836][T28349] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2536.330444][T28349] RSP: 002b:00007fb68b843c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2536.338866][T28349] RAX: ffffffffffffffda RBX: 00007fb68b843c90 RCX: 0000000000459879 14:15:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:15:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) sendfile(r0, r1, 0x0, 0x7ffff000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setregs(0xf, r3, 0x0, &(0x7f0000000100)="0c49c71eeb68c0991b08dcdb44b4551aaace72d343e1c5d7172f8fed6b1db991a69ce976e2bcd0a279020b93cc82b4e8b6a241cf2428635b1faebe56d369fe4acdabfd3fef6cafd58305bb882cf846eff5e400ddc91e978b96ca322252012f15a13fb8fc52707f028420deeccd0b9d2c38e952a800da64975018d318b50362450824210009e28c1cb847776cbf9720185761f67f227246") r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000280)=0x0) setpgid(r6, r7) perf_event_open(0x0, r6, 0x4, r5, 0x102) prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe220927cb13aeba91de1e10907f84356c9b6f44ddfa660100008000000000e4985731f95d9808000000811005c95ce7e0d4a3f9ec9eabb4c88c14a40c05a612c07f6a78c156ff1d56d45a3aad", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) pwrite64(r9, &(0x7f0000001540)="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", 0x105d, 0x0) tkill(r8, 0x38) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = getpid() ioctl$sock_SIOCGPGRP(r10, 0x8904, &(0x7f0000000280)=0x0) setpgid(r11, r12) r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = getpid() ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000280)=0x0) setpgid(r15, r16) perf_event_open(0x0, r15, 0x4, r14, 0x102) r17 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) perf_event_open(0x0, r15, 0x3, r17, 0x102) r18 = gettid() tgkill(r11, r18, 0x4) ptrace$cont(0x9, r8, 0x0, 0x0) [ 2536.346853][T28349] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2536.354833][T28349] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2536.362820][T28349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb68b8446d4 [ 2536.370802][T28349] R13: 00000000004c70e2 R14: 00000000004dc7a8 R15: 0000000000000006 14:15:47 executing program 0 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:15:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:47 executing program 3 (fault-call:3 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:15:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) [ 2536.659796][T28490] FAULT_INJECTION: forcing a failure. [ 2536.659796][T28490] name failslab, interval 1, probability 0, space 0, times 0 [ 2536.744869][T28338] ntfs: (device loop1): parse_options(): Unrecognized mount option fsmagic. [ 2536.757143][T28490] CPU: 1 PID: 28490 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2536.766311][T28490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2536.776377][T28490] Call Trace: [ 2536.779694][T28490] dump_stack+0x172/0x1f0 [ 2536.784048][T28490] should_fail.cold+0xa/0x15 [ 2536.788662][T28490] ? fault_create_debugfs_attr+0x180/0x180 [ 2536.794509][T28490] ? ___might_sleep+0x163/0x280 [ 2536.799383][T28490] __should_failslab+0x121/0x190 [ 2536.804319][T28490] should_failslab+0x9/0x14 [ 2536.808829][T28490] kmem_cache_alloc_node_trace+0x274/0x750 [ 2536.810967][T28338] ntfs: (device loop1): parse_options(): Unrecognized mount option dont_hash. [ 2536.814650][T28490] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2536.814670][T28490] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2536.835298][T28490] __kmalloc_node_track_caller+0x3d/0x70 [ 2536.840953][T28490] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2536.846875][T28490] __alloc_skb+0x10b/0x5e0 [ 2536.849247][T28338] ntfs: (device loop1): parse_options(): Unrecognized mount option defcontext. [ 2536.851329][T28490] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2536.851354][T28490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2536.871627][T28490] ? netlink_autobind.isra.0+0x228/0x310 [ 2536.875394][T28338] ntfs: (device loop1): parse_options(): Unrecognized mount option appraise_type. [ 2536.877267][T28490] netlink_sendmsg+0x972/0xd60 [ 2536.877287][T28490] ? netlink_unicast+0x710/0x710 [ 2536.877307][T28490] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2536.896237][T28338] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 2536.901783][T28490] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2536.901802][T28490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2536.901816][T28490] ? security_socket_sendmsg+0x8d/0xc0 [ 2536.901833][T28490] ? netlink_unicast+0x710/0x710 [ 2536.931931][T28490] sock_sendmsg+0xd7/0x130 [ 2536.936337][T28490] ___sys_sendmsg+0x803/0x920 [ 2536.941004][T28490] ? copy_msghdr_from_user+0x440/0x440 [ 2536.946463][T28490] ? __kasan_check_read+0x11/0x20 [ 2536.951469][T28490] ? __fget+0x384/0x560 [ 2536.955609][T28490] ? ksys_dup3+0x3e0/0x3e0 [ 2536.960015][T28490] ? __fget_light+0x1a9/0x230 [ 2536.964671][T28490] ? __fdget+0x1b/0x20 [ 2536.968722][T28490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2536.974946][T28490] __sys_sendmsg+0x105/0x1d0 [ 2536.979521][T28490] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2536.984537][T28490] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2536.989986][T28490] ? do_syscall_64+0x26/0x760 [ 2536.994644][T28490] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2537.000694][T28490] ? do_syscall_64+0x26/0x760 [ 2537.005355][T28490] __x64_sys_sendmsg+0x78/0xb0 [ 2537.010112][T28490] do_syscall_64+0xfa/0x760 [ 2537.014599][T28490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2537.020481][T28490] RIP: 0033:0x459879 [ 2537.024362][T28490] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:15:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2537.043943][T28490] RSP: 002b:00007fb68b843c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2537.052336][T28490] RAX: ffffffffffffffda RBX: 00007fb68b843c90 RCX: 0000000000459879 [ 2537.060297][T28490] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2537.068251][T28490] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2537.076225][T28490] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb68b8446d4 [ 2537.084197][T28490] R13: 00000000004c70e2 R14: 00000000004dc7a8 R15: 0000000000000006 [ 2537.103519][T28498] FAULT_INJECTION: forcing a failure. [ 2537.103519][T28498] name failslab, interval 1, probability 0, space 0, times 0 [ 2537.145317][T28498] CPU: 1 PID: 28498 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2537.154453][T28498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2537.154461][T28498] Call Trace: [ 2537.154487][T28498] dump_stack+0x172/0x1f0 [ 2537.154518][T28498] should_fail.cold+0xa/0x15 [ 2537.176781][T28498] ? fault_create_debugfs_attr+0x180/0x180 [ 2537.182713][T28498] ? ___might_sleep+0x163/0x280 [ 2537.187580][T28498] __should_failslab+0x121/0x190 [ 2537.187596][T28498] should_failslab+0x9/0x14 [ 2537.187615][T28498] __kmalloc+0x2e0/0x770 [ 2537.202215][T28498] ? mark_held_locks+0xf0/0xf0 [ 2537.206974][T28498] ? mark_lock+0xc2/0x1220 [ 2537.211369][T28498] ? _parse_integer+0x190/0x190 [ 2537.216205][T28498] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2537.221910][T28498] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2537.227437][T28498] ? tomoyo_path_number_perm+0x193/0x520 [ 2537.233064][T28498] tomoyo_path_number_perm+0x1dd/0x520 [ 2537.238511][T28498] ? tomoyo_path_number_perm+0x193/0x520 [ 2537.244190][T28498] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2537.249986][T28498] ? __f_unlock_pos+0x19/0x20 [ 2537.254658][T28498] ? __fget+0x384/0x560 [ 2537.258850][T28498] ? ksys_dup3+0x3e0/0x3e0 [ 2537.263295][T28498] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2537.269545][T28498] ? fput_many+0x12c/0x1a0 [ 2537.273956][T28498] tomoyo_file_ioctl+0x23/0x30 [ 2537.278708][T28498] security_file_ioctl+0x77/0xc0 [ 2537.283642][T28498] ksys_ioctl+0x57/0xd0 [ 2537.287799][T28498] __x64_sys_ioctl+0x73/0xb0 [ 2537.292424][T28498] do_syscall_64+0xfa/0x760 [ 2537.296915][T28498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2537.302795][T28498] RIP: 0033:0x459879 [ 2537.306683][T28498] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2537.326453][T28498] RSP: 002b:00007f15fd0f1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2537.334955][T28498] RAX: ffffffffffffffda RBX: 00007f15fd0f1c90 RCX: 0000000000459879 [ 2537.343483][T28498] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 2537.351457][T28498] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2537.359425][T28498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15fd0f26d4 [ 2537.367391][T28498] R13: 00000000004c460b R14: 00000000004d8938 R15: 0000000000000004 [ 2537.375879][T28498] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2537.383441][T28498] input: syz1 as /devices/virtual/input/input47 14:15:48 executing program 1 (fault-call:7 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:15:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:48 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:48 executing program 0 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:15:48 executing program 3 (fault-call:3 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 2537.512173][T28507] FAULT_INJECTION: forcing a failure. [ 2537.512173][T28507] name failslab, interval 1, probability 0, space 0, times 0 [ 2537.552367][T28509] FAULT_INJECTION: forcing a failure. [ 2537.552367][T28509] name failslab, interval 1, probability 0, space 0, times 0 [ 2537.565451][T28507] CPU: 1 PID: 28507 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2537.574581][T28507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2537.584649][T28507] Call Trace: [ 2537.587968][T28507] dump_stack+0x172/0x1f0 [ 2537.592318][T28507] should_fail.cold+0xa/0x15 [ 2537.596926][T28507] ? fault_create_debugfs_attr+0x180/0x180 [ 2537.602756][T28507] ? ___might_sleep+0x163/0x280 [ 2537.607627][T28507] __should_failslab+0x121/0x190 [ 2537.612577][T28507] should_failslab+0x9/0x14 [ 2537.617080][T28507] __kmalloc+0x2e0/0x770 [ 2537.621325][T28507] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2537.627560][T28507] ? fput_many+0x12c/0x1a0 [ 2537.631973][T28507] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2537.638210][T28507] ? strnlen_user+0x1ed/0x2e0 [ 2537.642882][T28507] ? __x64_sys_memfd_create+0x13c/0x470 [ 2537.648433][T28507] __x64_sys_memfd_create+0x13c/0x470 [ 2537.653803][T28507] ? memfd_fcntl+0x18c0/0x18c0 [ 2537.658559][T28507] ? do_syscall_64+0x26/0x760 [ 2537.663236][T28507] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2537.668531][T28507] ? trace_hardirqs_on+0x67/0x240 [ 2537.673555][T28507] do_syscall_64+0xfa/0x760 [ 2537.678071][T28507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2537.683955][T28507] RIP: 0033:0x459879 [ 2537.687843][T28507] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2537.707451][T28507] RSP: 002b:00007f561ca65a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2537.715862][T28507] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459879 [ 2537.723833][T28507] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2537.731802][T28507] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2537.739768][T28507] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f561ca666d4 14:15:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2537.747736][T28507] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2537.755728][T28509] CPU: 0 PID: 28509 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2537.764851][T28509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2537.774917][T28509] Call Trace: [ 2537.778223][T28509] dump_stack+0x172/0x1f0 [ 2537.778243][T28509] should_fail.cold+0xa/0x15 [ 2537.778259][T28509] ? fault_create_debugfs_attr+0x180/0x180 [ 2537.778282][T28509] __should_failslab+0x121/0x190 [ 2537.778297][T28509] should_failslab+0x9/0x14 [ 2537.778314][T28509] kmem_cache_alloc+0x47/0x710 [ 2537.789262][T28512] FAULT_INJECTION: forcing a failure. [ 2537.789262][T28512] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2537.793003][T28509] ? lock_acquire+0x190/0x410 [ 2537.825067][T28509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2537.831320][T28509] skb_clone+0x154/0x3d0 [ 2537.835559][T28509] netlink_deliver_tap+0x94d/0xbf0 [ 2537.840671][T28509] netlink_unicast+0x5a2/0x710 [ 2537.845437][T28509] ? netlink_attachskb+0x7c0/0x7c0 [ 2537.850558][T28509] ? _copy_from_iter_full+0x25d/0x8c0 [ 2537.855926][T28509] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2537.861640][T28509] ? __check_object_size+0x3d/0x437 [ 2537.866833][T28509] netlink_sendmsg+0x8a5/0xd60 [ 2537.871599][T28509] ? netlink_unicast+0x710/0x710 [ 2537.876526][T28509] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2537.882071][T28509] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2537.887523][T28509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2537.893752][T28509] ? security_socket_sendmsg+0x8d/0xc0 [ 2537.899208][T28509] ? netlink_unicast+0x710/0x710 [ 2537.904141][T28509] sock_sendmsg+0xd7/0x130 [ 2537.908550][T28509] ___sys_sendmsg+0x803/0x920 [ 2537.913328][T28509] ? copy_msghdr_from_user+0x440/0x440 [ 2537.918785][T28509] ? __kasan_check_read+0x11/0x20 [ 2537.923801][T28509] ? __fget+0x384/0x560 [ 2537.927968][T28509] ? ksys_dup3+0x3e0/0x3e0 [ 2537.932382][T28509] ? __fget_light+0x1a9/0x230 [ 2537.937067][T28509] ? __fdget+0x1b/0x20 [ 2537.941140][T28509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2537.947377][T28509] __sys_sendmsg+0x105/0x1d0 [ 2537.951973][T28509] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2537.957008][T28509] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2537.962457][T28509] ? do_syscall_64+0x26/0x760 [ 2537.967128][T28509] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2537.973187][T28509] ? do_syscall_64+0x26/0x760 [ 2537.977862][T28509] __x64_sys_sendmsg+0x78/0xb0 [ 2537.982618][T28509] do_syscall_64+0xfa/0x760 [ 2537.987134][T28509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2537.993016][T28509] RIP: 0033:0x459879 [ 2537.996928][T28509] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2538.016528][T28509] RSP: 002b:00007fb68b843c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2538.024930][T28509] RAX: ffffffffffffffda RBX: 00007fb68b843c90 RCX: 0000000000459879 [ 2538.032911][T28509] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2538.040873][T28509] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2538.048837][T28509] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb68b8446d4 [ 2538.058199][T28509] R13: 00000000004c70e2 R14: 00000000004dc7a8 R15: 0000000000000006 [ 2538.066192][T28512] CPU: 1 PID: 28512 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2538.075313][T28512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2538.085369][T28512] Call Trace: [ 2538.088682][T28512] dump_stack+0x172/0x1f0 [ 2538.093034][T28512] should_fail.cold+0xa/0x15 [ 2538.097639][T28512] ? fault_create_debugfs_attr+0x180/0x180 [ 2538.103457][T28512] ? lock_downgrade+0x920/0x920 [ 2538.108328][T28512] should_fail_alloc_page+0x50/0x60 [ 2538.113535][T28512] __alloc_pages_nodemask+0x1a1/0x900 [ 2538.118915][T28512] ? __kasan_check_read+0x11/0x20 [ 2538.123947][T28512] ? mark_lock+0xc2/0x1220 [ 2538.128374][T28512] ? __alloc_pages_slowpath+0x2540/0x2540 [ 2538.134109][T28512] ? __kasan_check_read+0x11/0x20 [ 2538.139158][T28512] ? fault_create_debugfs_attr+0x180/0x180 [ 2538.144977][T28512] cache_grow_begin+0x90/0xd20 [ 2538.149750][T28512] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2538.155481][T28512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2538.161734][T28512] __kmalloc+0x6b2/0x770 [ 2538.165984][T28512] ? mark_held_locks+0xf0/0xf0 [ 2538.170758][T28512] ? mark_lock+0xc2/0x1220 [ 2538.175185][T28512] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2538.180926][T28512] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2538.186498][T28512] ? tomoyo_path_number_perm+0x193/0x520 [ 2538.192125][T28512] tomoyo_path_number_perm+0x1dd/0x520 [ 2538.197565][T28512] ? tomoyo_path_number_perm+0x193/0x520 [ 2538.203184][T28512] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2538.208975][T28512] ? __f_unlock_pos+0x19/0x20 [ 2538.213668][T28512] ? __fget+0x384/0x560 [ 2538.217811][T28512] ? ksys_dup3+0x3e0/0x3e0 [ 2538.222215][T28512] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2538.228439][T28512] ? fput_many+0x12c/0x1a0 [ 2538.232846][T28512] tomoyo_file_ioctl+0x23/0x30 [ 2538.237683][T28512] security_file_ioctl+0x77/0xc0 [ 2538.242604][T28512] ksys_ioctl+0x57/0xd0 [ 2538.246757][T28512] __x64_sys_ioctl+0x73/0xb0 [ 2538.251334][T28512] do_syscall_64+0xfa/0x760 [ 2538.255826][T28512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2538.261735][T28512] RIP: 0033:0x459879 [ 2538.265615][T28512] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2538.286258][T28512] RSP: 002b:00007f15fd0f1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2538.294654][T28512] RAX: ffffffffffffffda RBX: 00007f15fd0f1c90 RCX: 0000000000459879 14:15:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:15:48 executing program 0 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:15:48 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2538.302610][T28512] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 2538.310581][T28512] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2538.318543][T28512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15fd0f26d4 [ 2538.326495][T28512] R13: 00000000004c460b R14: 00000000004d8938 R15: 0000000000000004 [ 2538.334768][T28517] FAULT_INJECTION: forcing a failure. [ 2538.334768][T28517] name failslab, interval 1, probability 0, space 0, times 0 [ 2538.368394][T28512] input: syz1 as /devices/virtual/input/input48 [ 2538.396731][T28517] CPU: 1 PID: 28517 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2538.405886][T28517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2538.415974][T28517] Call Trace: [ 2538.419279][T28517] dump_stack+0x172/0x1f0 [ 2538.423638][T28517] should_fail.cold+0xa/0x15 [ 2538.428240][T28517] ? fault_create_debugfs_attr+0x180/0x180 [ 2538.434152][T28517] ? ___might_sleep+0x163/0x280 [ 2538.439026][T28517] __should_failslab+0x121/0x190 [ 2538.443977][T28517] should_failslab+0x9/0x14 [ 2538.448488][T28517] kmem_cache_alloc_node+0x268/0x740 [ 2538.453786][T28517] ? mutex_lock_io_nested+0x1260/0x1260 [ 2538.459349][T28517] ? __netlink_dump_start+0x5a9/0x7d0 [ 2538.464750][T28517] __alloc_skb+0xd5/0x5e0 [ 2538.469099][T28517] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2538.474230][T28517] ? lock_downgrade+0x920/0x920 [ 2538.479095][T28517] ? __netlink_dump_start+0x10c/0x7d0 [ 2538.484490][T28517] netlink_dump+0x71f/0xfb0 [ 2538.489017][T28517] ? netlink_broadcast+0x50/0x50 [ 2538.493988][T28517] __netlink_dump_start+0x5b1/0x7d0 [ 2538.499210][T28517] rtnetlink_rcv_msg+0x73d/0xb00 [ 2538.504251][T28517] ? tc_dump_chain+0xcf0/0xcf0 [ 2538.509044][T28517] ? rtnetlink_put_metrics+0x590/0x590 [ 2538.514521][T28517] ? tc_dump_chain+0xcf0/0xcf0 [ 2538.519306][T28517] ? find_held_lock+0x35/0x130 [ 2538.524097][T28517] netlink_rcv_skb+0x177/0x450 [ 2538.528881][T28517] ? rtnetlink_put_metrics+0x590/0x590 [ 2538.534359][T28517] ? netlink_ack+0xb50/0xb50 [ 2538.538968][T28517] ? __kasan_check_read+0x11/0x20 [ 2538.544009][T28517] ? netlink_deliver_tap+0x254/0xbf0 [ 2538.549303][T28517] rtnetlink_rcv+0x1d/0x30 [ 2538.549321][T28517] netlink_unicast+0x531/0x710 [ 2538.549340][T28517] ? netlink_attachskb+0x7c0/0x7c0 [ 2538.549355][T28517] ? _copy_from_iter_full+0x25d/0x8c0 [ 2538.549371][T28517] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2538.549385][T28517] ? __check_object_size+0x3d/0x437 [ 2538.549405][T28517] netlink_sendmsg+0x8a5/0xd60 [ 2538.549423][T28517] ? netlink_unicast+0x710/0x710 [ 2538.558728][T28517] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2538.558748][T28517] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2538.558766][T28517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2538.558782][T28517] ? security_socket_sendmsg+0x8d/0xc0 [ 2538.558796][T28517] ? netlink_unicast+0x710/0x710 [ 2538.558812][T28517] sock_sendmsg+0xd7/0x130 [ 2538.558827][T28517] ___sys_sendmsg+0x803/0x920 [ 2538.558844][T28517] ? copy_msghdr_from_user+0x440/0x440 [ 2538.558867][T28517] ? __kasan_check_read+0x11/0x20 [ 2538.575042][T28517] ? __fget+0x384/0x560 [ 2538.575066][T28517] ? ksys_dup3+0x3e0/0x3e0 [ 2538.575089][T28517] ? __fget_light+0x1a9/0x230 [ 2538.575108][T28517] ? __fdget+0x1b/0x20 [ 2538.582798][T28638] FAULT_INJECTION: forcing a failure. [ 2538.582798][T28638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2538.585047][T28517] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2538.585071][T28517] __sys_sendmsg+0x105/0x1d0 [ 2538.585087][T28517] ? __sys_sendmsg_sock+0xd0/0xd0 [ 2538.585113][T28517] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2538.595581][T28517] ? do_syscall_64+0x26/0x760 [ 2538.595600][T28517] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2538.595614][T28517] ? do_syscall_64+0x26/0x760 [ 2538.595635][T28517] __x64_sys_sendmsg+0x78/0xb0 [ 2538.595655][T28517] do_syscall_64+0xfa/0x760 [ 2538.713928][T28517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2538.719816][T28517] RIP: 0033:0x459879 [ 2538.723706][T28517] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2538.743319][T28517] RSP: 002b:00007fb68b843c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2538.751729][T28517] RAX: ffffffffffffffda RBX: 00007fb68b843c90 RCX: 0000000000459879 [ 2538.759699][T28517] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2538.767699][T28517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2538.775680][T28517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb68b8446d4 [ 2538.783736][T28517] R13: 00000000004c70e2 R14: 00000000004dc7a8 R15: 0000000000000006 [ 2538.791728][T28638] CPU: 0 PID: 28638 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2538.800840][T28638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2538.800847][T28638] Call Trace: [ 2538.800871][T28638] dump_stack+0x172/0x1f0 [ 2538.800891][T28638] should_fail.cold+0xa/0x15 [ 2538.800907][T28638] ? fault_create_debugfs_attr+0x180/0x180 [ 2538.800923][T28638] ? ___might_sleep+0x163/0x280 [ 2538.800952][T28638] should_fail_alloc_page+0x50/0x60 [ 2538.838912][T28638] __alloc_pages_nodemask+0x1a1/0x900 [ 2538.844268][T28638] ? __alloc_pages_slowpath+0x2540/0x2540 [ 2538.849969][T28638] ? __kasan_check_read+0x11/0x20 [ 2538.854982][T28638] ? mark_lock+0xc2/0x1220 [ 2538.859383][T28638] ? pmd_val+0x85/0x100 [ 2538.863520][T28638] ? add_mm_counter_fast.part.0+0x40/0x40 [ 2538.869222][T28638] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2538.875443][T28638] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2538.881667][T28638] alloc_pages_vma+0x1bc/0x3f0 [ 2538.886418][T28638] __handle_mm_fault+0x1de2/0x3f20 [ 2538.891518][T28638] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2538.897053][T28638] ? __kasan_check_read+0x11/0x20 [ 2538.902070][T28638] handle_mm_fault+0x1b5/0x6c0 [ 2538.906820][T28638] __do_page_fault+0x536/0xdd0 [ 2538.911571][T28638] do_page_fault+0x38/0x590 [ 2538.916068][T28638] page_fault+0x39/0x40 [ 2538.920219][T28638] RIP: 0033:0x4080fd [ 2538.924111][T28638] Code: 0f 1f 44 00 00 c6 44 24 0e 06 48 c7 04 24 10 00 00 00 e9 56 ff ff ff e8 41 53 05 00 90 41 55 41 54 55 53 48 81 ec d8 1b 00 00 <48> 89 bc 24 08 01 00 00 48 89 b4 24 00 01 00 00 48 89 94 24 f8 00 [ 2538.943695][T28638] RSP: 002b:00007f5bc3827070 EFLAGS: 00010202 [ 2538.949742][T28638] RAX: 00000000004080f0 RBX: 00007f5bc3828c90 RCX: 0000000000000000 [ 2538.957704][T28638] RDX: 0000000020000000 RSI: ffffffffffffffff RDI: ffffffffffffffff [ 2538.965656][T28638] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 2538.973609][T28638] R10: 0000000000000064 R11: 0000000000000000 R12: 00007f5bc38296d4 [ 2538.981571][T28638] R13: 00000000004c8956 R14: 00000000004df868 R15: 0000000000000006 [ 2539.028073][T28641] FAULT_INJECTION: forcing a failure. [ 2539.028073][T28641] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.042556][T28641] CPU: 1 PID: 28641 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2539.051692][T28641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2539.061761][T28641] Call Trace: [ 2539.065077][T28641] dump_stack+0x172/0x1f0 [ 2539.069439][T28641] should_fail.cold+0xa/0x15 [ 2539.074062][T28641] ? fault_create_debugfs_attr+0x180/0x180 [ 2539.079897][T28641] ? ___might_sleep+0x163/0x280 [ 2539.084770][T28641] __should_failslab+0x121/0x190 [ 2539.089718][T28641] ? shmem_destroy_inode+0x80/0x80 [ 2539.094829][T28641] should_failslab+0x9/0x14 [ 2539.099339][T28641] kmem_cache_alloc+0x2aa/0x710 [ 2539.104188][T28641] ? __alloc_fd+0x487/0x620 [ 2539.108702][T28641] ? shmem_destroy_inode+0x80/0x80 [ 2539.113826][T28641] shmem_alloc_inode+0x1c/0x50 [ 2539.118606][T28641] alloc_inode+0x68/0x1e0 [ 2539.122953][T28641] new_inode_pseudo+0x19/0xf0 [ 2539.127640][T28641] new_inode+0x1f/0x40 [ 2539.131697][T28641] shmem_get_inode+0x84/0x7e0 [ 2539.136381][T28641] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2539.141913][T28641] shmem_file_setup+0x66/0x90 [ 2539.146573][T28641] __x64_sys_memfd_create+0x2a2/0x470 [ 2539.151954][T28641] ? memfd_fcntl+0x18c0/0x18c0 [ 2539.156701][T28641] ? do_syscall_64+0x26/0x760 [ 2539.161363][T28641] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2539.166631][T28641] ? trace_hardirqs_on+0x67/0x240 [ 2539.171656][T28641] do_syscall_64+0xfa/0x760 [ 2539.176149][T28641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2539.182027][T28641] RIP: 0033:0x459879 [ 2539.185907][T28641] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2539.205507][T28641] RSP: 002b:00007f561ca65a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2539.213907][T28641] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459879 14:15:49 executing program 3 (fault-call:3 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:15:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2539.221867][T28641] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2539.229826][T28641] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2539.237796][T28641] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f561ca666d4 [ 2539.245840][T28641] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2539.255128][ T1066] [ 2539.257464][ T1066] ============================================ [ 2539.263592][ T1066] WARNING: possible recursive locking detected [ 2539.269721][ T1066] 5.3.0-rc6-next-20190830 #75 Not tainted [ 2539.275422][ T1066] -------------------------------------------- [ 2539.281550][ T1066] oom_reaper/1066 is trying to acquire lock: [ 2539.287502][ T1066] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __mmu_notifier_invalidate_range_end+0x0/0x360 [ 2539.299469][ T1066] [ 2539.299469][ T1066] but task is already holding lock: [ 2539.306811][ T1066] ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 2539.317468][ T1066] [ 2539.317468][ T1066] other info that might help us debug this: [ 2539.325502][ T1066] Possible unsafe locking scenario: [ 2539.325502][ T1066] [ 2539.332938][ T1066] CPU0 [ 2539.336202][ T1066] ---- [ 2539.339464][ T1066] lock(mmu_notifier_invalidate_range_start); [ 2539.345605][ T1066] lock(mmu_notifier_invalidate_range_start); [ 2539.351739][ T1066] [ 2539.351739][ T1066] *** DEADLOCK *** [ 2539.351739][ T1066] [ 2539.359863][ T1066] May be due to missing lock nesting notation [ 2539.359863][ T1066] [ 2539.368175][ T1066] 2 locks held by oom_reaper/1066: [ 2539.373280][ T1066] #0: ffff8880939a14d0 (&mm->mmap_sem#2){++++}, at: oom_reaper+0x3a7/0x1320 [ 2539.382052][ T1066] #1: ffffffff8904ff60 (mmu_notifier_invalidate_range_start){+.+.}, at: __oom_reap_task_mm+0x196/0x490 [ 2539.393157][ T1066] [ 2539.393157][ T1066] stack backtrace: [ 2539.399036][ T1066] CPU: 1 PID: 1066 Comm: oom_reaper Not tainted 5.3.0-rc6-next-20190830 #75 [ 2539.407967][ T1066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2539.418010][ T1066] Call Trace: [ 2539.421300][ T1066] dump_stack+0x172/0x1f0 [ 2539.425616][ T1066] __lock_acquire.cold+0x15d/0x385 [ 2539.430710][ T1066] ? mark_held_locks+0xf0/0xf0 [ 2539.435456][ T1066] ? unmap_page_range+0x1df4/0x2380 [ 2539.440634][ T1066] lock_acquire+0x190/0x410 [ 2539.445121][ T1066] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 2539.451963][ T1066] __mmu_notifier_invalidate_range_end+0x3c/0x360 [ 2539.458363][ T1066] ? __mmu_notifier_invalidate_range_start+0x210/0x210 [ 2539.465195][ T1066] ? __mmu_notifier_invalidate_range_start+0x1a5/0x210 [ 2539.472029][ T1066] __oom_reap_task_mm+0x3fa/0x490 [ 2539.477037][ T1066] ? process_shares_mm+0x130/0x130 [ 2539.482129][ T1066] ? oom_reaper+0x3a7/0x1320 [ 2539.486712][ T1066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2539.492940][ T1066] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2539.498904][ T1066] ? __kasan_check_read+0x11/0x20 [ 2539.503910][ T1066] ? do_raw_spin_unlock+0x57/0x270 [ 2539.509023][ T1066] oom_reaper+0x2b2/0x1320 [ 2539.513431][ T1066] ? __oom_reap_task_mm+0x490/0x490 [ 2539.518617][ T1066] ? trace_hardirqs_on+0x67/0x240 [ 2539.523638][ T1066] ? finish_wait+0x260/0x260 [ 2539.528229][ T1066] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2539.534469][ T1066] ? __kthread_parkme+0x108/0x1c0 [ 2539.539480][ T1066] ? __kasan_check_read+0x11/0x20 [ 2539.544486][ T1066] kthread+0x361/0x430 [ 2539.548537][ T1066] ? __oom_reap_task_mm+0x490/0x490 [ 2539.553714][ T1066] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2539.559947][ T1066] ret_from_fork+0x24/0x30 [ 2539.565220][T28521] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2539.573275][ T1066] oom_reaper: reaped process 28638 (syz-executor.1), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 2539.578718][T28521] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2539.613674][T28518] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2539.617692][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2539.625238][T28518] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2539.661441][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2539.663805][T28648] FAULT_INJECTION: forcing a failure. [ 2539.663805][T28648] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.685557][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2539.698835][T28648] CPU: 1 PID: 28648 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2539.707979][T28648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2539.711158][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2539.718045][T28648] Call Trace: [ 2539.718067][T28648] dump_stack+0x172/0x1f0 [ 2539.718083][T28648] should_fail.cold+0xa/0x15 [ 2539.718096][T28648] ? fault_create_debugfs_attr+0x180/0x180 [ 2539.718117][T28648] ? page_to_nid.part.0+0x20/0x20 [ 2539.744138][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2539.746261][T28648] ? ___might_sleep+0x163/0x280 [ 2539.756419][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2539.758378][T28648] __should_failslab+0x121/0x190 [ 2539.758399][T28648] should_failslab+0x9/0x14 [ 2539.764546][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2539.774061][T28648] __kmalloc+0x2e0/0x770 [ 2539.774077][T28648] ? tomoyo_path_number_perm+0x214/0x520 [ 2539.774145][T28648] ? input_ff_create+0x61/0x323 [ 2539.774162][T28648] input_ff_create+0x61/0x323 [ 2539.788455][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2539.790750][T28648] uinput_ioctl_handler.isra.0+0x10d2/0x1e90 [ 2539.790768][T28648] ? uinput_read+0xdd0/0xdd0 [ 2539.831014][T28648] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2539.837265][T28648] ? tomoyo_path_number_perm+0x263/0x520 [ 2539.842908][T28648] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2539.848732][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2539.854989][T28648] ? __kasan_check_read+0x11/0x20 [ 2539.860051][T28648] uinput_ioctl+0x4a/0x58 [ 2539.864414][T28648] ? uinput_compat_ioctl+0xb0/0xb0 [ 2539.869542][T28648] do_vfs_ioctl+0xdb6/0x13e0 [ 2539.874146][T28648] ? ioctl_preallocate+0x210/0x210 [ 2539.879270][T28648] ? __fget+0x384/0x560 [ 2539.883423][T28648] ? ksys_dup3+0x3e0/0x3e0 [ 2539.887821][T28648] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2539.894048][T28648] ? fput_many+0x12c/0x1a0 [ 2539.898448][T28648] ? tomoyo_file_ioctl+0x23/0x30 [ 2539.903455][T28648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2539.909684][T28648] ? security_file_ioctl+0x8d/0xc0 [ 2539.914796][T28648] ksys_ioctl+0xab/0xd0 [ 2539.918962][T28648] __x64_sys_ioctl+0x73/0xb0 [ 2539.923560][T28648] do_syscall_64+0xfa/0x760 [ 2539.928067][T28648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2539.933961][T28648] RIP: 0033:0x459879 [ 2539.937845][T28648] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2539.957437][T28648] RSP: 002b:00007f15fd0f1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2539.965858][T28648] RAX: ffffffffffffffda RBX: 00007f15fd0f1c90 RCX: 0000000000459879 [ 2539.973812][T28648] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 14:15:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:15:50 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb", 0x5f, 0x10000}], 0x0, 0x0) 14:15:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2539.981787][T28648] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2539.989751][T28648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15fd0f26d4 [ 2539.997723][T28648] R13: 00000000004c460b R14: 00000000004d8938 R15: 0000000000000004 [ 2540.006018][T28648] kobject: 'input49' (0000000013095198): kobject_cleanup, parent 00000000d97c1035 [ 2540.011897][ T3891] kobject: 'loop1' (00000000ba435cf9): kobject_uevent_env [ 2540.015371][T28648] kobject: 'input49' (0000000013095198): calling ktype release [ 2540.050071][T28663] FAULT_INJECTION: forcing a failure. [ 2540.050071][T28663] name failslab, interval 1, probability 0, space 0, times 0 [ 2540.059867][ T3891] kobject: 'loop1' (00000000ba435cf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2540.066504][T28648] kobject: 'input49': free name [ 2540.073284][T28661] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2540.086466][T28663] CPU: 1 PID: 28663 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2540.094953][T28661] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2540.095590][T28663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2540.115774][T28663] Call Trace: [ 2540.119075][T28663] dump_stack+0x172/0x1f0 [ 2540.123410][T28663] should_fail.cold+0xa/0x15 [ 2540.128012][T28663] ? fault_create_debugfs_attr+0x180/0x180 [ 2540.133829][T28663] ? page_to_nid.part.0+0x20/0x20 [ 2540.138866][T28663] ? ___might_sleep+0x163/0x280 [ 2540.143729][T28663] __should_failslab+0x121/0x190 [ 2540.148800][T28663] should_failslab+0x9/0x14 [ 2540.153308][T28663] kmem_cache_alloc+0x2aa/0x710 [ 2540.158168][T28663] ? lock_acquire+0x190/0x410 [ 2540.162864][T28663] ? current_time+0x6b/0x140 [ 2540.167463][T28663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2540.173713][T28663] ? timespec64_trunc+0xf0/0x180 [ 2540.178657][T28663] __d_alloc+0x2e/0x8c0 [ 2540.182823][T28663] d_alloc_pseudo+0x1e/0x70 [ 2540.187343][T28663] alloc_file_pseudo+0xe2/0x280 [ 2540.192204][T28663] ? alloc_file+0x4d0/0x4d0 [ 2540.194573][T28667] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2540.196714][T28663] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2540.196733][T28663] __shmem_file_setup.part.0+0x108/0x2b0 [ 2540.196752][T28663] shmem_file_setup+0x66/0x90 [ 2540.203768][T28667] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2540.209890][T28663] __x64_sys_memfd_create+0x2a2/0x470 [ 2540.209904][T28663] ? memfd_fcntl+0x18c0/0x18c0 [ 2540.209919][T28663] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2540.209937][T28663] ? trace_hardirqs_off_caller+0x65/0x230 [ 2540.251746][T28663] ? trace_hardirqs_on+0x67/0x240 [ 2540.256754][T28663] do_syscall_64+0xfa/0x760 [ 2540.261243][T28663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2540.267127][T28663] RIP: 0033:0x459879 [ 2540.271021][T28663] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2540.290605][T28663] RSP: 002b:00007f561ca65a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:15:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="24000001b30007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:15:50 executing program 3 (fault-call:3 fault-nth:3): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:15:51 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2540.299009][T28663] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459879 [ 2540.306973][T28663] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2540.314926][T28663] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2540.322879][T28663] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f561ca666d4 [ 2540.330831][T28663] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2540.377236][T28661] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2540.378360][T28666] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2540.384415][T28661] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2540.391689][T28666] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2540.414665][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2540.440119][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2540.456504][T28676] FAULT_INJECTION: forcing a failure. [ 2540.456504][T28676] name failslab, interval 1, probability 0, space 0, times 0 [ 2540.476506][T28676] CPU: 1 PID: 28676 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2540.477919][T28677] FAULT_INJECTION: forcing a failure. [ 2540.477919][T28677] name failslab, interval 1, probability 0, space 0, times 0 [ 2540.485774][T28676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2540.485781][T28676] Call Trace: [ 2540.485806][T28676] dump_stack+0x172/0x1f0 [ 2540.485825][T28676] should_fail.cold+0xa/0x15 [ 2540.485846][T28676] ? fault_create_debugfs_attr+0x180/0x180 [ 2540.526488][T28676] ? page_to_nid.part.0+0x20/0x20 [ 2540.531528][T28676] ? ___might_sleep+0x163/0x280 [ 2540.536392][T28676] __should_failslab+0x121/0x190 [ 2540.541340][T28676] should_failslab+0x9/0x14 [ 2540.545844][T28676] kmem_cache_alloc+0x2aa/0x710 [ 2540.550700][T28676] ? lock_acquire+0x190/0x410 [ 2540.555385][T28676] ? current_time+0x6b/0x140 [ 2540.559985][T28676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2540.566277][T28676] ? timespec64_trunc+0xf0/0x180 [ 2540.571218][T28676] __d_alloc+0x2e/0x8c0 [ 2540.575381][T28676] d_alloc_pseudo+0x1e/0x70 [ 2540.579901][T28676] alloc_file_pseudo+0xe2/0x280 [ 2540.584762][T28676] ? alloc_file+0x4d0/0x4d0 [ 2540.589281][T28676] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2540.595542][T28676] __shmem_file_setup.part.0+0x108/0x2b0 [ 2540.601183][T28676] shmem_file_setup+0x66/0x90 [ 2540.605872][T28676] __x64_sys_memfd_create+0x2a2/0x470 [ 2540.611252][T28676] ? memfd_fcntl+0x18c0/0x18c0 [ 2540.616033][T28676] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2540.622103][T28676] ? trace_hardirqs_off_caller+0x65/0x230 [ 2540.627835][T28676] ? trace_hardirqs_on+0x67/0x240 [ 2540.632873][T28676] do_syscall_64+0xfa/0x760 [ 2540.637396][T28676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2540.643325][T28676] RIP: 0033:0x459879 [ 2540.647225][T28676] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2540.666829][T28676] RSP: 002b:00007f561ca65a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2540.675252][T28676] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459879 [ 2540.683232][T28676] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be7a8 14:15:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) 14:15:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) [ 2540.691208][T28676] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2540.699174][T28676] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f561ca666d4 [ 2540.707139][T28676] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2540.715117][T28677] CPU: 0 PID: 28677 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2540.718592][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2540.724246][T28677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2540.724251][T28677] Call Trace: [ 2540.724271][T28677] dump_stack+0x172/0x1f0 [ 2540.724292][T28677] should_fail.cold+0xa/0x15 [ 2540.732257][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2540.741450][T28677] ? fault_create_debugfs_attr+0x180/0x180 [ 2540.741467][T28677] ? page_to_nid.part.0+0x20/0x20 [ 2540.741482][T28677] ? ___might_sleep+0x163/0x280 [ 2540.741496][T28677] __should_failslab+0x121/0x190 [ 2540.741515][T28677] should_failslab+0x9/0x14 [ 2540.741533][T28677] __kmalloc+0x2e0/0x770 [ 2540.754904][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2540.763834][T28677] ? tomoyo_path_number_perm+0x214/0x520 [ 2540.763845][T28677] ? input_ff_create+0x61/0x323 [ 2540.763856][T28677] input_ff_create+0x61/0x323 [ 2540.763872][T28677] uinput_ioctl_handler.isra.0+0x10d2/0x1e90 [ 2540.763892][T28677] ? uinput_read+0xdd0/0xdd0 [ 2540.770197][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2540.774788][T28677] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2540.774806][T28677] ? tomoyo_path_number_perm+0x263/0x520 [ 2540.781210][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2540.784564][T28677] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2540.784586][T28677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2540.789509][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2540.793293][T28677] ? __kasan_check_read+0x11/0x20 [ 2540.793314][T28677] uinput_ioctl+0x4a/0x58 [ 2540.802216][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2540.806024][T28677] ? uinput_compat_ioctl+0xb0/0xb0 [ 2540.806043][T28677] do_vfs_ioctl+0xdb6/0x13e0 [ 2540.811289][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2540.815555][T28677] ? ioctl_preallocate+0x210/0x210 [ 2540.815571][T28677] ? __fget+0x384/0x560 [ 2540.825045][ T3891] kobject: 'loop1' (00000000ba435cf9): kobject_uevent_env [ 2540.826233][T28677] ? ksys_dup3+0x3e0/0x3e0 [ 2540.826251][T28677] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 14:15:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0x0) [ 2540.826271][T28677] ? fput_many+0x12c/0x1a0 [ 2540.840235][ T3891] kobject: 'loop1' (00000000ba435cf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2540.842646][T28677] ? tomoyo_file_ioctl+0x23/0x30 [ 2540.842667][T28677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2540.966617][T28677] ? security_file_ioctl+0x8d/0xc0 [ 2540.971743][T28677] ksys_ioctl+0xab/0xd0 [ 2540.975912][T28677] __x64_sys_ioctl+0x73/0xb0 [ 2540.980516][T28677] do_syscall_64+0xfa/0x760 [ 2540.985212][T28677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2540.991107][T28677] RIP: 0033:0x459879 [ 2540.994997][T28677] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2541.014864][T28677] RSP: 002b:00007f15fd0f1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2541.023282][T28677] RAX: ffffffffffffffda RBX: 00007f15fd0f1c90 RCX: 0000000000459879 [ 2541.031255][T28677] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 14:15:51 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:15:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="24000001b30007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2541.039220][T28677] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2541.047189][T28677] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15fd0f26d4 [ 2541.055163][T28677] R13: 00000000004c460b R14: 00000000004d8938 R15: 0000000000000004 [ 2541.071803][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env 14:15:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0), 0xfefe) sendfile(r1, r2, &(0x7f0000000000), 0xffe) [ 2541.098944][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2541.129416][T28706] FAULT_INJECTION: forcing a failure. [ 2541.129416][T28706] name failslab, interval 1, probability 0, space 0, times 0 [ 2541.134545][T28813] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2541.168825][T28677] kobject: 'input50' (0000000074cf0aa7): kobject_cleanup, parent 00000000d97c1035 [ 2541.174888][T28706] CPU: 0 PID: 28706 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2541.178260][T28813] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2541.187151][T28706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2541.187156][T28706] Call Trace: [ 2541.187182][T28706] dump_stack+0x172/0x1f0 [ 2541.187201][T28706] should_fail.cold+0xa/0x15 [ 2541.187216][T28706] ? fault_create_debugfs_attr+0x180/0x180 [ 2541.187233][T28706] ? page_to_nid.part.0+0x20/0x20 [ 2541.187247][T28706] ? ___might_sleep+0x163/0x280 [ 2541.187262][T28706] __should_failslab+0x121/0x190 [ 2541.187274][T28706] should_failslab+0x9/0x14 [ 2541.187291][T28706] kmem_cache_alloc+0x2aa/0x710 [ 2541.250081][T28706] ? memcg_kmem_put_cache+0x3e/0x50 [ 2541.255258][T28706] ? kmem_cache_alloc+0x314/0x710 [ 2541.260268][T28706] security_file_alloc+0x39/0x170 [ 2541.265273][T28706] __alloc_file+0xde/0x340 [ 2541.269672][T28706] alloc_empty_file+0x72/0x170 [ 2541.274420][T28706] alloc_file+0x5e/0x4d0 [ 2541.278655][T28706] alloc_file_pseudo+0x189/0x280 [ 2541.284186][T28706] ? alloc_file+0x4d0/0x4d0 [ 2541.288679][T28706] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2541.294921][T28706] __shmem_file_setup.part.0+0x108/0x2b0 [ 2541.300549][T28706] shmem_file_setup+0x66/0x90 [ 2541.305211][T28706] __x64_sys_memfd_create+0x2a2/0x470 [ 2541.310568][T28706] ? memfd_fcntl+0x18c0/0x18c0 [ 2541.315318][T28706] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2541.321394][T28706] ? trace_hardirqs_off_caller+0x65/0x230 [ 2541.327095][T28706] ? trace_hardirqs_on+0x67/0x240 [ 2541.332105][T28706] do_syscall_64+0xfa/0x760 [ 2541.336601][T28706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2541.342474][T28706] RIP: 0033:0x459879 [ 2541.346366][T28706] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2541.365963][T28706] RSP: 002b:00007f561ca65a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2541.374363][T28706] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459879 [ 2541.382332][T28706] RDX: 0000000020000028 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2541.390285][T28706] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2541.398252][T28706] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f561ca666d4 [ 2541.406203][T28706] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 14:15:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="24000000b30107031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2541.420284][T28698] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2541.429267][T28677] kobject: 'input50' (0000000074cf0aa7): calling ktype release [ 2541.444198][T28698] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2541.448270][T28677] kobject: 'input50': free name 14:15:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:15:52 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2541.466519][T28813] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2541.475473][T28695] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2541.481327][T28813] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2541.488699][T28695] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2541.507877][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2541.515051][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:15:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2541.549234][T28827] FAULT_INJECTION: forcing a failure. [ 2541.549234][T28827] name failslab, interval 1, probability 0, space 0, times 0 [ 2541.572199][T28698] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2541.595680][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2541.605424][T28827] CPU: 0 PID: 28827 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2541.614557][T28827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2541.619473][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2541.624626][T28827] Call Trace: [ 2541.624648][T28827] dump_stack+0x172/0x1f0 [ 2541.624673][T28827] should_fail.cold+0xa/0x15 [ 2541.639340][T28698] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2541.642400][T28827] ? fault_create_debugfs_attr+0x180/0x180 [ 2541.642414][T28827] ? unwind_get_return_address+0x61/0xa0 [ 2541.642434][T28827] ? profile_setup.cold+0xbb/0xbb [ 2541.673233][T28827] ? ___might_sleep+0x163/0x280 [ 2541.678101][T28827] __should_failslab+0x121/0x190 [ 2541.679531][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2541.683040][T28827] should_failslab+0x9/0x14 [ 2541.683059][T28827] __kmalloc+0x2e0/0x770 14:15:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000000)) [ 2541.698894][T28827] ? mark_held_locks+0xf0/0xf0 [ 2541.703670][T28827] ? stack_trace_save+0xac/0xe0 [ 2541.708530][T28827] ? stack_trace_consume_entry+0x190/0x190 [ 2541.713424][T28698] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2541.714346][T28827] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2541.714360][T28827] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2541.714376][T28827] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2541.728496][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2541.732791][T28827] ? tomoyo_path_perm+0x1cb/0x430 [ 2541.732806][T28827] tomoyo_path_perm+0x230/0x430 [ 2541.732822][T28827] ? tomoyo_path_perm+0x1cb/0x430 [ 2541.740543][T28698] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2541.748498][T28827] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2541.748511][T28827] ? __fget+0x35d/0x560 [ 2541.748523][T28827] ? __kasan_check_read+0x11/0x20 [ 2541.748534][T28827] ? __kasan_check_read+0x11/0x20 [ 2541.748546][T28827] ? __fget+0xa3/0x560 [ 2541.748567][T28827] ? lock_acquire+0x190/0x410 [ 2541.748581][T28827] ? do_sys_ftruncate+0x282/0x550 [ 2541.748602][T28827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2541.813316][T28827] tomoyo_path_truncate+0x1d/0x30 [ 2541.818329][T28827] security_path_truncate+0xf2/0x150 [ 2541.823603][T28827] do_sys_ftruncate+0x3d9/0x550 [ 2541.828445][T28827] __x64_sys_ftruncate+0x59/0x80 [ 2541.833368][T28827] do_syscall_64+0xfa/0x760 [ 2541.837860][T28827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2541.843733][T28827] RIP: 0033:0x459847 [ 2541.847621][T28827] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2541.867214][T28827] RSP: 002b:00007f561ca65a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2541.875605][T28827] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459847 [ 2541.883560][T28827] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 2541.891514][T28827] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 14:15:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2541.899477][T28827] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2541.907434][T28827] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2541.931420][T28831] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2541.946261][T28831] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:15:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2542.005068][T28822] kobject: 'input51' (000000004f921c81): kobject_cleanup, parent 00000000d97c1035 [ 2542.026458][T28822] kobject: 'input51' (000000004f921c81): calling ktype release [ 2542.030104][T28831] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2542.036786][T28822] kobject: 'input51': free name 14:15:52 executing program 3: socket$inet(0x2, 0x80000, 0x1) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000640)={&(0x7f0000000540)=""/200, 0x3004000, 0x1000, 0xdc20}, 0x18) socket$inet6(0xa, 0x1, 0xffff) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:15:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3, 0x0, 0x0, 0x0) 14:15:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) r1 = socket$inet(0x10, 0x66dda08c0defc83b, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2542.052873][T28827] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2542.055276][T28831] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2542.077438][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2542.084613][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:15:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:15:52 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2542.149227][ T3891] kobject: 'loop1' (00000000ba435cf9): kobject_uevent_env [ 2542.166773][T28947] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env 14:15:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0xfffffffffffffff9) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:15:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2542.192027][T28947] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2542.194933][ T3891] kobject: 'loop1' (00000000ba435cf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2542.245811][T29043] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2542.269500][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2542.279050][T29043] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:15:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:52 executing program 3: ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) [ 2542.289772][T28943] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2542.290499][T29064] FAULT_INJECTION: forcing a failure. [ 2542.290499][T29064] name failslab, interval 1, probability 0, space 0, times 0 [ 2542.310418][T28943] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2542.314143][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2542.338899][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env 14:15:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfff) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2542.349262][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2542.369201][T28947] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2542.369362][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2542.383475][T29064] CPU: 1 PID: 29064 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2542.392587][T29064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2542.400458][T28947] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2542.402642][T29064] Call Trace: [ 2542.402666][T29064] dump_stack+0x172/0x1f0 [ 2542.402684][T29064] should_fail.cold+0xa/0x15 [ 2542.402706][T29064] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 2542.430013][T29064] ? fault_create_debugfs_attr+0x180/0x180 [ 2542.435856][T29064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2542.442110][T29064] ? should_fail+0x1de/0x852 [ 2542.446712][T29064] ? ___might_sleep+0x163/0x280 [ 2542.447125][T28947] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2542.451562][T29064] __should_failslab+0x121/0x190 [ 2542.451578][T29064] should_failslab+0x9/0x14 [ 2542.451588][T29064] __kmalloc+0x2e0/0x770 [ 2542.451609][T29064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2542.458707][T28947] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2542.463455][T29064] ? simple_dname+0xd1/0x1f0 [ 2542.463471][T29064] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2542.463485][T29064] tomoyo_encode2.part.0+0xf5/0x400 [ 2542.463504][T29064] ? stack_trace_consume_entry+0x190/0x190 [ 2542.508978][T29064] tomoyo_encode+0x2b/0x50 [ 2542.513378][T29064] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2542.518998][T29064] ? tomoyo_path_perm+0x1cb/0x430 [ 2542.524017][T29064] tomoyo_path_perm+0x230/0x430 [ 2542.528861][T29064] ? tomoyo_path_perm+0x1cb/0x430 [ 2542.533867][T29064] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2542.540498][T29064] ? __fget+0x35d/0x560 [ 2542.544666][T29064] ? __kasan_check_read+0x11/0x20 [ 2542.549679][T29064] ? __kasan_check_read+0x11/0x20 [ 2542.554708][T29064] ? __fget+0xa3/0x560 [ 2542.558782][T29064] ? lock_acquire+0x190/0x410 [ 2542.563473][T29064] ? do_sys_ftruncate+0x282/0x550 [ 2542.568486][T29064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2542.574709][T29064] tomoyo_path_truncate+0x1d/0x30 [ 2542.579715][T29064] security_path_truncate+0xf2/0x150 [ 2542.584993][T29064] do_sys_ftruncate+0x3d9/0x550 [ 2542.589916][T29064] __x64_sys_ftruncate+0x59/0x80 [ 2542.594836][T29064] do_syscall_64+0xfa/0x760 [ 2542.599333][T29064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2542.605551][T29064] RIP: 0033:0x459847 [ 2542.609428][T29064] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2542.629015][T29064] RSP: 002b:00007f561ca65a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2542.637421][T29064] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459847 14:15:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x4, 0x0, 0x0, 0x0) [ 2542.645388][T29064] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 [ 2542.653375][T29064] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2542.661332][T29064] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2542.669290][T29064] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2542.677915][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2542.678616][T29043] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2542.698759][T29043] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2542.707095][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2542.735772][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:15:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs(r1, &(0x7f0000000100)='net/igmp6\x00') r2 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2542.760144][T29075] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2542.778506][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2542.795037][T29075] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:15:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:15:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 2542.801183][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2542.817132][T29064] ERROR: Out of memory at tomoyo_realpath_from_path. 14:15:53 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2542.861303][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2542.887599][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2542.898928][T29074] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2542.905908][T29074] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2542.918633][T29197] FAULT_INJECTION: forcing a failure. [ 2542.918633][T29197] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2542.924208][T29195] kobject: 'input52' (000000004855da65): kobject_cleanup, parent 00000000d97c1035 [ 2542.931850][T29197] CPU: 0 PID: 29197 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 2542.931859][T29197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:15:53 executing program 0: rt_sigtimedwait(&(0x7f00000000c0)={0x6}, &(0x7f00000001c0), &(0x7f0000000100)={0x77359400}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4001, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) r4 = accept4$rose(0xffffffffffffffff, &(0x7f0000000280)=@short={0xb, @remote, @bcast, 0x1, @netrom}, &(0x7f00000002c0)=0x1c, 0x80000) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000240)='net/udp\x00', 0x0, r4) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x204085, 0x0) r5 = socket$inet(0x10, 0x2000000003, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2542.931863][T29197] Call Trace: [ 2542.931886][T29197] dump_stack+0x172/0x1f0 [ 2542.931903][T29197] should_fail.cold+0xa/0x15 [ 2542.931918][T29197] ? fault_create_debugfs_attr+0x180/0x180 [ 2542.931934][T29197] ? is_bpf_text_address+0xac/0x170 [ 2542.931948][T29197] ? __kasan_check_read+0x11/0x20 [ 2542.931968][T29197] should_fail_alloc_page+0x50/0x60 [ 2542.931981][T29197] __alloc_pages_nodemask+0x1a1/0x900 [ 2542.931992][T29197] ? __bpf_address_lookup+0x310/0x310 [ 2542.932007][T29197] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2542.932019][T29197] ? __alloc_pages_slowpath+0x2540/0x2540 [ 2542.932036][T29197] ? kernel_text_address+0x73/0xf0 [ 2542.932049][T29197] ? fault_create_debugfs_attr+0x180/0x180 [ 2542.932062][T29197] cache_grow_begin+0x90/0xd20 [ 2542.932075][T29197] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2542.932089][T29197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2542.932102][T29197] __kmalloc+0x6b2/0x770 [ 2542.932112][T29197] ? mark_held_locks+0xf0/0xf0 [ 2542.932132][T29197] ? stack_trace_save+0xac/0xe0 [ 2542.946254][T29195] kobject: 'input52' (000000004855da65): calling ktype release [ 2542.950439][T29197] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2542.950453][T29197] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2542.950464][T29197] ? tomoyo_path_perm+0x1cb/0x430 [ 2542.950479][T29197] tomoyo_path_perm+0x230/0x430 [ 2542.950493][T29197] ? tomoyo_path_perm+0x1cb/0x430 [ 2542.950515][T29197] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2543.096885][T29197] ? __fget+0x35d/0x560 [ 2543.101022][T29197] ? __kasan_check_read+0x11/0x20 [ 2543.106024][T29197] ? __kasan_check_read+0x11/0x20 [ 2543.111029][T29197] ? __fget+0xa3/0x560 [ 2543.115084][T29197] ? lock_acquire+0x190/0x410 [ 2543.119741][T29197] ? do_sys_ftruncate+0x282/0x550 [ 2543.124747][T29197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2543.130976][T29197] tomoyo_path_truncate+0x1d/0x30 [ 2543.135990][T29197] security_path_truncate+0xf2/0x150 [ 2543.141257][T29197] do_sys_ftruncate+0x3d9/0x550 [ 2543.146091][T29197] __x64_sys_ftruncate+0x59/0x80 [ 2543.151009][T29197] do_syscall_64+0xfa/0x760 [ 2543.155498][T29197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2543.161542][T29197] RIP: 0033:0x459847 [ 2543.165427][T29197] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2543.185028][T29197] RSP: 002b:00007f561ca65a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2543.193416][T29197] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000459847 [ 2543.201380][T29197] RDX: 0000000020000028 RSI: 0000000000020000 RDI: 0000000000000004 14:15:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2543.209347][T29197] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2543.217300][T29197] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2543.225253][T29197] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2543.244662][T29195] kobject: 'input52': free name [ 2543.256783][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2543.266946][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2543.269322][T29075] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2543.278801][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2543.284667][T29228] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2543.291937][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2543.313034][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2543.321257][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2543.330066][T29075] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2543.333230][ T3891] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2543.346884][T29228] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:15:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000000)=0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 2543.348705][ T3891] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2543.370680][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2543.378178][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2543.403217][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env 14:15:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2543.419327][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2543.424707][T29075] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2543.436812][T29228] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2543.442954][ T3891] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2543.449425][T29307] kobject: 'input53' (0000000065c7936b): kobject_add_internal: parent: 'input', set: 'devices' [ 2543.453616][ T3891] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2543.462753][T29228] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2543.473399][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2543.484585][T29307] kobject: 'input53' (0000000065c7936b): kobject_uevent_env [ 2543.489692][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2543.498880][T29075] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:15:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 2543.508749][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2543.519325][T29307] kobject: 'input53' (0000000065c7936b): fill_kobj_path: path = '/devices/virtual/input/input53' [ 2543.537313][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2543.556681][T29307] kobject: 'input53' (0000000065c7936b): fill_kobj_path: path = '/devices/virtual/input/input53' 14:15:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x5, 0x0, 0x0, 0x0) 14:15:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2543.570348][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2543.584894][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2543.591226][T29311] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2543.608138][T29311] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2543.617637][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2543.625568][T29307] input: syz1 as /devices/virtual/input/input53 [ 2543.632202][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2543.641382][T29307] kobject: 'event4' (00000000a61cd0e1): kobject_add_internal: parent: 'input53', set: 'devices' [ 2543.650917][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2543.655535][T29307] kobject: 'event4' (00000000a61cd0e1): kobject_uevent_env [ 2543.665211][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2543.670262][T29307] kobject: 'event4' (00000000a61cd0e1): fill_kobj_path: path = '/devices/virtual/input/input53/event4' [ 2543.678783][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2543.688923][T29311] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2543.695868][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2543.705660][T29311] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2543.714464][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2543.735225][T29306] kobject: 'event4' (00000000a61cd0e1): kobject_uevent_env [ 2543.742742][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:15:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 14:15:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2543.762214][T29306] kobject: 'event4' (00000000a61cd0e1): fill_kobj_path: path = '/devices/virtual/input/input53/event4' [ 2543.777308][T29317] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2543.784305][T29317] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2543.804593][T29306] kobject: '(null)' (00000000d71e455f): kobject_cleanup, parent 00000000a61cd0e1 [ 2543.806170][ T3891] kobject: 'loop1' (00000000ba435cf9): kobject_uevent_env 14:15:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='b\\rfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2543.842987][T29306] kobject: '(null)' (00000000d71e455f): calling ktype release [ 2543.848833][ T3891] kobject: 'loop1' (00000000ba435cf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2543.869076][T29323] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2543.881184][T29323] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2543.895268][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2543.896640][T29306] kobject: 'event4' (00000000a61cd0e1): kobject_cleanup, parent 00000000d97c1035 [ 2543.918280][T29306] kobject: 'event4' (00000000a61cd0e1): calling ktype release [ 2543.919927][T29316] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2543.926127][T29306] kobject: 'event4': free name 14:15:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2543.937071][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2543.938330][T29306] kobject: 'input53' (0000000065c7936b): kobject_uevent_env [ 2543.950594][T29323] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2543.955917][T29306] kobject: 'input53' (0000000065c7936b): fill_kobj_path: path = '/devices/virtual/input/input53' [ 2543.968750][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2543.975511][T29306] kobject: 'input53' (0000000065c7936b): kobject_cleanup, parent 00000000d97c1035 [ 2543.983008][T29323] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2543.989914][T29306] kobject: 'input53' (0000000065c7936b): calling ktype release [ 2544.000607][T29316] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2544.007790][T29306] kobject: 'input53': free name [ 2544.019365][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2544.026238][T29307] kobject: 'input54' (000000008773109a): kobject_add_internal: parent: 'input', set: 'devices' [ 2544.043696][T29307] kobject: 'input54' (000000008773109a): kobject_uevent_env [ 2544.051480][T29307] kobject: 'input54' (000000008773109a): fill_kobj_path: path = '/devices/virtual/input/input54' [ 2544.058674][ T3891] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2544.062617][T29307] kobject: 'input54' (000000008773109a): fill_kobj_path: path = '/devices/virtual/input/input54' [ 2544.080434][ T3891] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2544.081424][T29307] input: syz1 as /devices/virtual/input/input54 14:15:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btr%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r0, r1, 0x0, 0x7ffff000) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000001c0)=0x1000, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x22f, 0x400c000, &(0x7f0000000200)={0x2, 0x4e20, @multicast2}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000100)={0x7}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = socket$inet(0x10, 0x2000000003, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r5, 0x0, 0x48a, &(0x7f0000000000)={0x6, 0x0, 0x5}, 0xc) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2544.120450][T29325] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2544.126880][T29307] kobject: 'event4' (00000000cf278353): kobject_add_internal: parent: 'input54', set: 'devices' [ 2544.152806][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2544.166595][T29325] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2544.177340][T29307] kobject: 'event4' (00000000cf278353): kobject_uevent_env [ 2544.177673][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2544.196470][T29307] kobject: 'event4' (00000000cf278353): fill_kobj_path: path = '/devices/virtual/input/input54/event4' [ 2544.214078][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2544.227548][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2544.238181][T29307] kobject: 'event4' (00000000cf278353): kobject_uevent_env [ 2544.247181][T29325] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2544.253467][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2544.255422][T29307] kobject: 'event4' (00000000cf278353): fill_kobj_path: path = '/devices/virtual/input/input54/event4' [ 2544.266811][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2544.273455][T29325] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2544.293132][T29307] kobject: '(null)' (00000000188ef336): kobject_cleanup, parent 00000000cf278353 [ 2544.302666][T29307] kobject: '(null)' (00000000188ef336): calling ktype release [ 2544.305961][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2544.330887][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2544.344758][ T3891] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2544.346842][T29307] kobject: 'event4' (00000000cf278353): kobject_cleanup, parent 00000000d97c1035 [ 2544.352209][ T3891] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2544.362499][T29307] kobject: 'event4' (00000000cf278353): calling ktype release [ 2544.374999][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2544.379407][T29307] kobject: 'event4': free name [ 2544.386132][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2544.391597][T29307] kobject: 'input54' (000000008773109a): kobject_uevent_env [ 2544.405649][ T3891] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2544.409146][T29307] kobject: 'input54' (000000008773109a): fill_kobj_path: path = '/devices/virtual/input/input54' [ 2544.415750][ T3891] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2544.417083][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2544.426977][T29307] kobject: 'input54' (000000008773109a): kobject_cleanup, parent 00000000d97c1035 [ 2544.438598][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2544.443725][T29307] kobject: 'input54' (000000008773109a): calling ktype release [ 2544.456164][ T3891] kobject: 'loop1' (00000000ba435cf9): kobject_uevent_env 14:15:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) 14:15:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 14:15:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btr\\s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x6, 0x0, 0x0, 0x0) 14:15:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000000)={0x0, @multicast2, 0x4e20, 0x1, 'wrr\x00', 0x6a, 0x30000, 0x45}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) bind$bt_l2cap(r4, &(0x7f0000000100)={0x1f, 0x532f, {0x9, 0x4, 0x101, 0x1f, 0x5, 0x1}, 0x4}, 0xe) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r5, 0x0, 0x7ffff000) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f00000000c0)=0x800, 0x4) r6 = socket$inet(0x10, 0xd118c748456a5e97, 0x1000800007fff) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2544.472027][T29307] kobject: 'input54': free name [ 2544.480335][ T3891] kobject: 'loop1' (00000000ba435cf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2544.494259][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env 14:15:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2544.528880][T29348] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2544.530741][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2544.551236][T29353] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2544.558904][T29348] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2544.633268][T29353] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:15:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r3, r4, 0x0, 0x7ffff000) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000001880)=""/213) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r6, 0x1, 0x0, 0x0, {{}, 0x0, 0xb, 0x0, {0x97, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x2002}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x1c, r6, 0x210, 0x70bd29, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x880944c60912d5b1}, 0x80) accept4(r4, 0x0, &(0x7f0000001840), 0x80000) sendfile(r2, r2, 0x0, 0xfffff000) sendmsg$kcm(r2, &(0x7f0000001800)={&(0x7f00000000c0)=@isdn={0x22, 0x7, 0x400, 0x401, 0x5}, 0x80, &(0x7f0000001680)=[{&(0x7f00000001c0)="43904f4c657b73d894ffa59b9398fc9d4cbeed9a790cee5b1f436471765808ec6b52bed5118b46f82c1022ea2f08982518515d9ae42c5b7916bb6517989195248cf048ff4d762a9412b588b1a6555cacd92dbeb20d", 0x55}, {&(0x7f0000000240)="a64f84f9818244aee5f4d18f0aa2d36eef8b2b92c8d80e935fa990eca932593278a5fcf8dc60f15b798304a12559a9497c88a744513bb2ac5222230cc407205f7c7761c36f03f55aa8236d207331595ae911ee309148bc071fc8a11ea1636947c38c6962", 0x64}, {&(0x7f00000002c0)="65b5b8ecf546941403ced2e65fa0642bacc200998cdf828f4ba180cf53ed2e55356c2360d00a8bb20442ca8579d70005f6387e7938d389b3c5985a984d1e46dedaeb48b1306136ea5de8f96cf71cd5c6dab1e7967ebcc3da6b785b8aeca271661d4918b4c276af2c0a29b017ef296ed68ed53199c0ab6898198b72f87fdc26c885e01c5575abbf6f3c0325a72628b070aea62db4d6297c8e5712ff83addc0e892ab4a3f14689945b9942547a1a8b3bb757b78d7c0769d9710f61c7141925dc93726c1decbb2620edc85850a687bd70ee219c3367ce6a680f8cbe3b35fa1977", 0xdf}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000000)="c8d21a98b858ff6847cea80019326bcc0266cd186f771df184cea553efe983", 0x1f}, {&(0x7f00000013c0)="b5e5c5e8868607a500eaf96b3e3ea8051d8e5bc46ec205402929370eaae813c10f1c963d23f632a1", 0x28}, {&(0x7f0000001400)="08cb5fe033f8be01d85d66ab671ee01c72d07a655fdad87e1591fc08a9246d803ca7fdf60179164a3d6c70d244450130163438d569231aed76646d0da13ff17df0e737304cbf2a91b6b858851f847f6c30e3ebf6f789897d1d927a82722c4f0e18a5fdbc157dc3165e6bb7cd17d4df9fd3251fec8f4b590cbef5166cdd80fd0c349d7323f7d58b7f1cdea42a4fa5369d1e9c70a1b389871e6e397920050d5b59aec514669db904160df56999f068b3231b5a4540f89cf679a908671c52491cacd48ba9", 0xc3}, {&(0x7f0000001500)="4057d24e51136d3e7668020e4b23bdf6e1906f97cfc6982459321bba61a41e03c32ddf22d35e91a0b4bb4076cc3612e3bcb9f2c7808b44aef906953931ab78d97f1f98e6423b75c0933d5f365b457dac49c5858079b4d95915f858fb843a1dab7cc9ec4b7b32f14f717b4deb2f17e31533627eda4924f314363388989b933681e6f023760fee879febd2c34bef4bbdb303c77c3d6dece5ca51bd75c9a3f66e56cdb95c31cdb29b9e3c476a", 0xab}, {&(0x7f00000015c0)="7731c26ce39bf34996bbd547e7486157ba5510b799c07aad0e7af6a8083538abf1a518941bd1748158d2c61043be68af6af570491c750ce19de8af49bb754bdc206943314504902e03ff52b03dd250fa37c7cc31b709faf667f6c482505b51c8d002fad21cf500ba382205b9eb90cb7cd2db2c4828cfe7f91eed09cc9484e52b7940f48f19d26329c8c7a912aee20113e7f95eec55ff66f3ccf7334e92b402", 0x9f}], 0x9, &(0x7f0000001740)=ANY=[@ANYBLOB="a80000000000000001000000ff0f00001bc1e2760548592d48fe7be478d0ef0370644f7253203c5748dcb98c9435347171f8d041e08a4e1c4b45de70ac5da3131724141aa9b1971062f39d22437bb5dc24e2e9d40ac5e6c48ef02e02d047d5e34a583a76d7081e78ee685381118d7c00d8546e378e97ecec7c201dcb5cd443871b06cd1cdd00f8e78f3f65846b1c37cf4c73579305d83ff7f42eb46038f3738edc96f8000000"], 0xa8}, 0x4) r7 = socket$inet(0x10, 0x2000000003, 0x400000000) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2544.705642][T29366] kobject: 'input55' (000000009ace4f2d): kobject_cleanup, parent 00000000d97c1035 [ 2544.735782][T29346] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env 14:15:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2544.768347][T29366] kobject: 'input55' (000000009ace4f2d): calling ktype release [ 2544.782953][T29346] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2544.795882][T29348] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2544.804754][T29366] kobject: 'input55': free name [ 2544.820302][T29348] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2544.831536][T29366] kobject: 'input56' (000000000fbe8545): kobject_cleanup, parent 00000000d97c1035 [ 2544.864995][T29353] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2544.904901][T29366] kobject: 'input56' (000000000fbe8545): calling ktype release 14:15:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 2544.931818][T29353] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2544.961081][T29366] kobject: 'input56': free name 14:15:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0xdee7eff6e5c18d59) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:15:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r2, r3, 0x0, 0x7ffff000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x1, 0x4) 14:15:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2545.107881][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2545.143911][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:15:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x7, 0x0, 0x0, 0x0) [ 2545.155552][T29353] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2545.156657][T29394] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2545.169826][T29353] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2545.198080][T29394] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2545.233918][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2545.264954][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:15:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2545.273090][T29405] kobject: 'input57' (0000000027420bb5): kobject_add_internal: parent: 'input', set: 'devices' [ 2545.300440][ T3891] kobject: 'loop1' (00000000ba435cf9): kobject_uevent_env [ 2545.316631][T29394] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env 14:15:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xffffeffffffffffd) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2545.326175][ T3891] kobject: 'loop1' (00000000ba435cf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2545.334736][T29405] kobject: 'input57' (0000000027420bb5): kobject_uevent_env [ 2545.348003][T29394] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2545.348408][T29407] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2545.365237][T29405] kobject: 'input57' (0000000027420bb5): fill_kobj_path: path = '/devices/virtual/input/input57' [ 2545.371559][T29407] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' 14:15:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 2545.493059][T29405] kobject: 'input57' (0000000027420bb5): fill_kobj_path: path = '/devices/virtual/input/input57' 14:15:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2545.536490][T29405] input: syz1 as /devices/virtual/input/input57 14:15:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x48) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_flowlabel\x00') getsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 2545.588473][T29405] kobject: 'event4' (000000005abec299): kobject_add_internal: parent: 'input57', set: 'devices' [ 2545.624426][T29435] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2545.641187][T29406] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2545.653927][T29435] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2545.666871][T29405] kobject: 'event4' (000000005abec299): kobject_uevent_env [ 2545.674903][T29406] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2545.685635][T29405] kobject: 'event4' (000000005abec299): fill_kobj_path: path = '/devices/virtual/input/input57/event4' 14:15:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) [ 2545.717653][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2545.725838][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2545.742139][T29407] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2545.755404][T29407] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2545.777983][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2545.778597][T29442] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2545.789170][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2545.798273][T29404] kobject: 'event4' (000000005abec299): kobject_uevent_env [ 2545.825333][T29442] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2545.852761][T29407] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env [ 2545.859886][T29407] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2545.884903][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_uevent_env [ 2545.900764][T29404] kobject: 'event4' (000000005abec299): fill_kobj_path: path = '/devices/virtual/input/input57/event4' [ 2545.909792][ T3891] kobject: 'loop0' (0000000007f4e3fa): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2545.914836][T29404] kobject: '(null)' (00000000f70ca6c4): kobject_cleanup, parent 000000005abec299 [ 2545.934144][T29404] kobject: '(null)' (00000000f70ca6c4): calling ktype release [ 2545.953707][ T3891] kobject: 'loop2' (0000000058303161): kobject_uevent_env [ 2545.961150][ T3891] kobject: 'loop2' (0000000058303161): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2545.971637][T29404] kobject: 'event4' (000000005abec299): kobject_cleanup, parent 00000000d97c1035 [ 2545.975061][ T3891] kobject: 'loop1' (00000000ba435cf9): kobject_uevent_env [ 2545.980934][T29404] kobject: 'event4' (000000005abec299): calling ktype release [ 2545.980952][T29404] kobject: 'event4': free name [ 2545.990836][ T3891] kobject: 'loop1' (00000000ba435cf9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2545.995850][T29404] kobject: 'input57' (0000000027420bb5): kobject_uevent_env [ 2546.061964][T29404] kobject: 'input57' (0000000027420bb5): fill_kobj_path: path = '/devices/virtual/input/input57' [ 2546.075144][T29404] kobject: 'input57' (0000000027420bb5): kobject_cleanup, parent 00000000d97c1035 [ 2546.085296][T29404] kobject: 'input57' (0000000027420bb5): calling ktype release [ 2546.093288][T29404] kobject: 'input57': free name [ 2546.100342][T29405] kobject: 'input58' (000000009b2f49a2): kobject_add_internal: parent: 'input', set: 'devices' [ 2546.111445][T29405] kobject: 'input58' (000000009b2f49a2): kobject_uevent_env [ 2546.119008][T29405] kobject: 'input58' (000000009b2f49a2): fill_kobj_path: path = '/devices/virtual/input/input58' [ 2546.130569][T29405] kobject: 'input58' (000000009b2f49a2): fill_kobj_path: path = '/devices/virtual/input/input58' [ 2546.141385][T29405] input: syz1 as /devices/virtual/input/input58 [ 2546.147934][T29405] kobject: 'event4' (00000000b3b341ce): kobject_add_internal: parent: 'input58', set: 'devices' [ 2546.163222][T29405] kobject: 'event4' (00000000b3b341ce): kobject_uevent_env [ 2546.172238][T29405] kobject: 'event4' (00000000b3b341ce): fill_kobj_path: path = '/devices/virtual/input/input58/event4' [ 2546.183849][T29405] kobject: 'event4' (00000000b3b341ce): kobject_uevent_env [ 2546.194763][T29405] kobject: 'event4' (00000000b3b341ce): fill_kobj_path: path = '/devices/virtual/input/input58/event4' [ 2546.208726][T29405] kobject: '(null)' (000000001cf7afa2): kobject_cleanup, parent 00000000b3b341ce [ 2546.220476][T29405] kobject: '(null)' (000000001cf7afa2): calling ktype release [ 2546.266537][T29405] kobject: 'event4' (00000000b3b341ce): kobject_cleanup, parent 00000000d97c1035 [ 2546.275671][T29405] kobject: 'event4' (00000000b3b341ce): calling ktype release [ 2546.283410][T29405] kobject: 'event4': free name [ 2546.288444][T29405] kobject: 'input58' (000000009b2f49a2): kobject_uevent_env [ 2546.295743][T29405] kobject: 'input58' (000000009b2f49a2): fill_kobj_path: path = '/devices/virtual/input/input58' [ 2546.306461][T29405] kobject: 'input58' (000000009b2f49a2): kobject_cleanup, parent 00000000d97c1035 14:15:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r1, r2, 0x0, 0x7ffff000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') sendfile(r4, r5, 0x0, 0x7ffff000) ioctl$KVM_SET_NESTED_STATE(r5, 0x4080aebf, &(0x7f0000001180)={0x0, 0x0, 0x2080, {0x1}, [], "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", "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"}) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={r3, 0xff}, 0x8) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x2}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:15:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r1 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d0008000000000000ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 14:15:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) 14:15:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200), 0x0, 0x10000}], 0x0, 0x0) 14:15:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) r4 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x8, 0x0, 0x0, 0x0) [ 2546.315746][T29405] kobject: 'input58' (000000009b2f49a2): calling ktype release [ 2546.323472][T29405] kobject: 'input58': free name [ 2546.343247][ T3891] kobject: 'loop3' (000000007f04036b): kobject_uevent_env [ 2546.382421][ T3891] kobject: 'loop3' (000000007f04036b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2546.386663][T29478] kobject: 'loop5' (00000000ff90d2fb): kobject_uevent_env [ 2546.394709][ T3891] kobject: 'loop4' (00000000740ab597): kobject_uevent_env [ 2546.419332][T29475] kobject: 'kvm' (00000000bc8d6b09): kobject_uevent_env 14:15:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r3 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000002c0), 0xfefe) sendfile(r1, r3, &(0x7f0000000000), 0xffe) 14:15:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000018cffffff0000005f42485266535f4dc81de105f8a37982d8fbdae96b112fd7d32e280066dfeb1c2b48f168956b7f3f383e2c947b414c8bf2e653a0ea989077595451f20bb117c4fae072a4d277204e2c2b01359e40151d52e5e19dfff9f23ec3b7111e208e1181fab51dec63cb1b2fc1c00e090092acf0416b8e881204be24c08e0987222c", 0xbe, 0x10000}], 0x0, 0x0) [ 2546.425741][ T3891] kobject: 'loop4' (00000000740ab597): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2546.439657][T29475] kobject: 'kvm' (00000000bc8d6b09): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2546.449821][T29483] kobject: 'input59' (000000002e9cdbeb): kobject_add_internal: parent: 'input', set: 'devices' [ 2546.472164][T29478] kobject: 'loop5' (00000000ff90d2fb): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2546.494769][T29483] kobject: 'input59' (000000002e9cdbeb): kobject_uevent_env [ 2546.507581][ T3891] kobject: 'loop0' (0000000007f4e3fa): kobject_ueve