) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000007c0)={0x14, r1, 0xffff}, 0x14}}, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) syz_genetlink_get_family_id$fou(0x0) 11:11:30 executing program 0: r0 = socket(0x1e, 0x805, 0x0) connect$llc(r0, &(0x7f00000000c0)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) 11:11:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2c, r1, 0x0, 0x0, 0x0, {0x4}, [@ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}]}, 0x2c}}, 0x0) 11:11:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x21, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) [ 572.779776][T23282] UBIFS error (pid: 23282): cannot open "(null)", error -22 11:11:30 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_timedsend(r0, &(0x7f0000000080)="437c37d2f040d477431df83fedfe3f8c5120a17f80b0c3355d76d1b17d048bd8b75697f684a21ea954d9e082919de32478dce2e7dc448e8c30c1d98cd60f7662c252391a4f06e08f2cdf8508d8e24f4191ccdbdb46e9605e073bc74ac69d90861f42d9b86a1aef8096feefc63f3df4392a26289eb2a277fcbb6d01691e8afa35e129ea198b69473189cd6e1e608752ede12ee253d8f9bec622418e3a8fc4b1793bda1bcd69eb043285ee31332c24742be425a9eaea7f2aab229a497b2afe636b25b04c786520844f881e01a921488b75c59c20546aae53309bc93ce08b6a53931c4230cd36ef37b3", 0xe8, 0x8, &(0x7f0000000180)={0x0, 0x989680}) 11:11:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x2}}, 0x0) 11:11:30 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/adsp1\x00', 0x40001, 0x0) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) 11:11:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000007c0)={0x14, r1, 0xffff}, 0x14}}, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) syz_genetlink_get_family_id$fou(0x0) 11:11:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2c, r1, 0x0, 0x0, 0x0, {0x4}, [@ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}]}, 0x2c}}, 0x0) 11:11:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000007c0)={0x14, r1, 0xffff}, 0x14}}, 0x0) 11:11:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x14, r1, 0x7, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 11:11:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r1, &(0x7f0000000080), 0x5b) 11:11:31 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 11:11:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r1, &(0x7f0000000080), 0x5b) 11:11:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000007c0)={0x14, r1, 0xffff}, 0x14}}, 0x0) 11:11:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x14, r1, 0x7, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 11:11:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x2, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TCXONC(r2, 0x4b36, 0x0) 11:11:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x14, r1, 0x7, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 11:11:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x3, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d500", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80045510, &(0x7f0000000000)) 11:11:32 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000600)) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1f}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001040)='#vmnet1nodevem1\x00\xb9\x05\x98 \x8e\xf1\x91e\x12\xcfxu4H\x91\xbbl\xcd\xf1n\x99s\xcc\x7f\x06\x00w\x835k\xc0#\xd6\x80\x00\x8d\xc2\xc0<\xbd*\xe9Y\x82\xfa\x02\xd5\xd5\xe5<\xc2i\x11\xce\xf1\x9f\x14\xd7E\x1561]\xab\xe7\xf5\x1bCv\xee\xb4#\xf5dD!\xf4\xffiu\x00\xa5\xe7\xef\xdbc\xdd\x03\x00\x00\x00\xa2\n\x06^\x01\xd04$qd,\'HI\x9e\x8f\f1\x86.+6^\xfe)\"\xba\xe74\xabG\xf5J\x00w\xa8\xae\x1a\x87\x04\xf0\x11\xff\x90\x85\x00\xa3\xb15u\x1e/\xbeaz\xf3\xf8\xd5\'\tj\xa5\xe7\x87\x11 \x84\xe3\xa1m\n\n\x180\xb4F\x85[\xfcv\"\x87\x88\xfa\xf0\xa3\xcf\xe6\xb6V6\x06\xbc>]\adp\t\x01\x8dTe!81\x91\x18D\xf3\x98\x82\x90`\xdb\xba\xd6\xfc7OL\x85*4j\xd8w\xfd\x89\xd3]+E\xd4uy\x02\x9bv\xce\x96l\b\xc4\xae\xe8\x02\xc7\xc7\\.\xa2\x87\xf4D\xb2\xd4L\x00\x00\x00\x00\xfa<\b\xf0\xb4+\x15\xdd\x19*\x8d\xff\xc0\x80\x86\x90`\xd4\xb6\xfe\x9b\x17\xa4\x9d\x83T\xf6\t\xd9)\x92\x10\t\xe8XQPba\x8f)M\xe0*\x11\xbf\xf2\xc6\x0e\xde\x83\xc2\xe6\xb28\x84%\x7fy\xd4\x8b\x13\x11\xde\x17\xaf\x8c\xd2\xb4\xa5\xa1~>\x838\rI\xe4\xc3\xbb\xb4@w\x83\f\x02\x9f\xd1\x9a\x1bz)\x9fT\x06\xdf\xa6\xb1\'\xf107Gy\x90&\xd4\xa2\xa6\xe4\x05\xa5\"\xf4\x90.\xeb\xa0Q\x1c\x83\xa8Z\xe4\x94B\xd3\xfc\\\rxzs\xbf\xb4\xc2\xcd\x97|p\x92E\xb7\xab\x9c\xd2=\xca\xa12\x0e>\xc4\xdb\xfb\x03\xba\t?\xf0\xf84\x80\x9a\xc3\x83\x0f\x80E!n\x0fU\x85\x19^X\xc5Bt+\xb4\xc7<\xf0\x17\xb6WC\x91\x0e\xd90}U+\xc0\x1d\x93\xc2 \x19\n\xcb\xd1x\xb3\xcb\x03W\xfe\xc7\xc7\xba\x13\x8a\xcc\x11\xb8J\"\x9f\xf5\x00~\xf8\x97\xdfG\xef\xecz\xc1$\xeak\xdf\xf6\xcb\xf9\xe7\xccn*Q\x9f8\x9dc\xf9\x81\\>\xcb\xa3.]\x13\x1e\xa85\xcb6\xady\xd8\xfd\x97\xcdV\xcaMo\x93\xc7\xae\x8b#Q\xe7\xa6X\x1dz\r\xb7O\xbfR1\xf4\x01\xae\x83v\xa4P\xd8D\x9d\x96\xfcj\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xbc\x05\xe1%\xe6\xc8\xc9\xd2\xdf-L\x8c\x87\x1e\x8d\x98\xd2s\x91\xd6\x02\x0e\xe0\x8a\xb31\xcb\xfes)\xa0\\0\xf8\xab\x0f\xa7J\xafT?g\xa0\xe3\x9b>\xc8s \x7f\xd5', 0x6) write(r2, &(0x7f0000000040)='/', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) r9 = socket$inet(0x2, 0x3, 0x2) r10 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r10, 0x0, 0xca, &(0x7f0000000000), 0x10) r11 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_int(r11, 0x0, 0xca, &(0x7f0000000000), 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r12, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x1f000000) setsockopt$inet_int(r11, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast1}}}, 0x88) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r13 = socket(0x10, 0x3, 0x0) sendmsg$netlink(r13, &(0x7f0000004800)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="180000001c001100000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7fbbe842ae9ac8874a4e3ab3fbe504a99b441fccb2a916944434456369289f9b6670713099ffa03975a3d844114e9c7e07599e9c35c48074c36d957e51fa19faf946cc0800000042d5ecc79649a3408dadd7ee03623fdf1253fc4a74"], 0x3}, {&(0x7f00000004c0)=ANY=[@ANYBLOB="100000000000040000445f7b17a49d56874ee9445dbe0c2df3d53bd8ff53447a1057b8460c809520887de5eb25b3a6b6b87e1550085fa390329bcbdb1b766ff90fdf6e4b4f77c52046101a11cddf483c45f5c39edcd57d"], 0x1}], 0x2}, 0x0) getsockopt$packet_int(r13, 0x107, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) 11:11:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x18, r1, 0x7, 0x0, 0x0, {0x4}, [@ETHTOOL_A_LINKINFO_HEADER={0x4}]}, 0x18}}, 0x0) 11:11:32 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='ubifs\x00', 0x2008811, 0x0) 11:11:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d500", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:32 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDFONTOP_SET(r0, 0x4b3b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 11:11:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x4, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d500", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x18, r1, 0x7, 0x0, 0x0, {0x4}, [@ETHTOOL_A_LINKINFO_HEADER={0x4}]}, 0x18}}, 0x0) 11:11:32 executing program 2: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x4, @perf_config_ext={0x6, 0xb7df}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 11:11:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x5, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x5c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 11:11:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d5001475000000", @ANYRES32=r3, @ANYBLOB="0a0f86000a000200aaaaaaaaaa0c000001000000b29313936a175704978c7bf5506c0c6ba4352ebf3825faf742e85da6f3280004060000f0ffffff0000007470373e10b3bc6b348f6bd2ce1eb73e7e72ff81b852985cdc81ad83c2071f21593b89ed8e5eebb6225aa1abbf7d9e9c48a3e5a2c9219348b8e7a01faa1952ae8e000396a1e788ea0000000000009d86836482006128a6620f9a16ed4bf6f4c17da87893eaa9874b0500ab89e74e5842555c5bd2c688365bc1e855395c864a52ac59d1decac6a5e8c6269453872a6de0308a222a902dba9c5b14afd8e00523fe2d34330f5147f05e68e4f79808b3d76039b67d54a66d3eff00000000000000801ffce7dbd88c519f19b0607eca2b51e980636d951b10e1a484c18dbaf6c2a51030bbdd4d11c37bc8a981682461feb33a"], 0x3}}, 0x0) 11:11:33 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000600)) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1f}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001040)='#vmnet1nodevem1\x00\xb9\x05\x98 \x8e\xf1\x91e\x12\xcfxu4H\x91\xbbl\xcd\xf1n\x99s\xcc\x7f\x06\x00w\x835k\xc0#\xd6\x80\x00\x8d\xc2\xc0<\xbd*\xe9Y\x82\xfa\x02\xd5\xd5\xe5<\xc2i\x11\xce\xf1\x9f\x14\xd7E\x1561]\xab\xe7\xf5\x1bCv\xee\xb4#\xf5dD!\xf4\xffiu\x00\xa5\xe7\xef\xdbc\xdd\x03\x00\x00\x00\xa2\n\x06^\x01\xd04$qd,\'HI\x9e\x8f\f1\x86.+6^\xfe)\"\xba\xe74\xabG\xf5J\x00w\xa8\xae\x1a\x87\x04\xf0\x11\xff\x90\x85\x00\xa3\xb15u\x1e/\xbeaz\xf3\xf8\xd5\'\tj\xa5\xe7\x87\x11 \x84\xe3\xa1m\n\n\x180\xb4F\x85[\xfcv\"\x87\x88\xfa\xf0\xa3\xcf\xe6\xb6V6\x06\xbc>]\adp\t\x01\x8dTe!81\x91\x18D\xf3\x98\x82\x90`\xdb\xba\xd6\xfc7OL\x85*4j\xd8w\xfd\x89\xd3]+E\xd4uy\x02\x9bv\xce\x96l\b\xc4\xae\xe8\x02\xc7\xc7\\.\xa2\x87\xf4D\xb2\xd4L\x00\x00\x00\x00\xfa<\b\xf0\xb4+\x15\xdd\x19*\x8d\xff\xc0\x80\x86\x90`\xd4\xb6\xfe\x9b\x17\xa4\x9d\x83T\xf6\t\xd9)\x92\x10\t\xe8XQPba\x8f)M\xe0*\x11\xbf\xf2\xc6\x0e\xde\x83\xc2\xe6\xb28\x84%\x7fy\xd4\x8b\x13\x11\xde\x17\xaf\x8c\xd2\xb4\xa5\xa1~>\x838\rI\xe4\xc3\xbb\xb4@w\x83\f\x02\x9f\xd1\x9a\x1bz)\x9fT\x06\xdf\xa6\xb1\'\xf107Gy\x90&\xd4\xa2\xa6\xe4\x05\xa5\"\xf4\x90.\xeb\xa0Q\x1c\x83\xa8Z\xe4\x94B\xd3\xfc\\\rxzs\xbf\xb4\xc2\xcd\x97|p\x92E\xb7\xab\x9c\xd2=\xca\xa12\x0e>\xc4\xdb\xfb\x03\xba\t?\xf0\xf84\x80\x9a\xc3\x83\x0f\x80E!n\x0fU\x85\x19^X\xc5Bt+\xb4\xc7<\xf0\x17\xb6WC\x91\x0e\xd90}U+\xc0\x1d\x93\xc2 \x19\n\xcb\xd1x\xb3\xcb\x03W\xfe\xc7\xc7\xba\x13\x8a\xcc\x11\xb8J\"\x9f\xf5\x00~\xf8\x97\xdfG\xef\xecz\xc1$\xeak\xdf\xf6\xcb\xf9\xe7\xccn*Q\x9f8\x9dc\xf9\x81\\>\xcb\xa3.]\x13\x1e\xa85\xcb6\xady\xd8\xfd\x97\xcdV\xcaMo\x93\xc7\xae\x8b#Q\xe7\xa6X\x1dz\r\xb7O\xbfR1\xf4\x01\xae\x83v\xa4P\xd8D\x9d\x96\xfcj\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xbc\x05\xe1%\xe6\xc8\xc9\xd2\xdf-L\x8c\x87\x1e\x8d\x98\xd2s\x91\xd6\x02\x0e\xe0\x8a\xb31\xcb\xfes)\xa0\\0\xf8\xab\x0f\xa7J\xafT?g\xa0\xe3\x9b>\xc8s \x7f\xd5', 0x6) write(r2, &(0x7f0000000040)='/', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) r9 = socket$inet(0x2, 0x3, 0x2) r10 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r10, 0x0, 0xca, &(0x7f0000000000), 0x10) r11 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_int(r11, 0x0, 0xca, &(0x7f0000000000), 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r12, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x1f000000) setsockopt$inet_int(r11, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast1}}}, 0x88) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r13 = socket(0x10, 0x3, 0x0) sendmsg$netlink(r13, &(0x7f0000004800)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="180000001c001100000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7fbbe842ae9ac8874a4e3ab3fbe504a99b441fccb2a916944434456369289f9b6670713099ffa03975a3d844114e9c7e07599e9c35c48074c36d957e51fa19faf946cc0800000042d5ecc79649a3408dadd7ee03623fdf1253fc4a74"], 0x3}, {&(0x7f00000004c0)=ANY=[@ANYBLOB="100000000000040000445f7b17a49d56874ee9445dbe0c2df3d53bd8ff53447a1057b8460c809520887de5eb25b3a6b6b87e1550085fa390329bcbdb1b766ff90fdf6e4b4f77c52046101a11cddf483c45f5c39edcd57d"], 0x1}], 0x2}, 0x0) getsockopt$packet_int(r13, 0x107, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) 11:11:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x6, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x18, r1, 0x7, 0x0, 0x0, {0x4}, [@ETHTOOL_A_LINKINFO_HEADER={0x4}]}, 0x18}}, 0x0) 11:11:33 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x8108551b, &(0x7f0000000000)) 11:11:33 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000600)) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1f}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001040)='#vmnet1nodevem1\x00\xb9\x05\x98 \x8e\xf1\x91e\x12\xcfxu4H\x91\xbbl\xcd\xf1n\x99s\xcc\x7f\x06\x00w\x835k\xc0#\xd6\x80\x00\x8d\xc2\xc0<\xbd*\xe9Y\x82\xfa\x02\xd5\xd5\xe5<\xc2i\x11\xce\xf1\x9f\x14\xd7E\x1561]\xab\xe7\xf5\x1bCv\xee\xb4#\xf5dD!\xf4\xffiu\x00\xa5\xe7\xef\xdbc\xdd\x03\x00\x00\x00\xa2\n\x06^\x01\xd04$qd,\'HI\x9e\x8f\f1\x86.+6^\xfe)\"\xba\xe74\xabG\xf5J\x00w\xa8\xae\x1a\x87\x04\xf0\x11\xff\x90\x85\x00\xa3\xb15u\x1e/\xbeaz\xf3\xf8\xd5\'\tj\xa5\xe7\x87\x11 \x84\xe3\xa1m\n\n\x180\xb4F\x85[\xfcv\"\x87\x88\xfa\xf0\xa3\xcf\xe6\xb6V6\x06\xbc>]\adp\t\x01\x8dTe!81\x91\x18D\xf3\x98\x82\x90`\xdb\xba\xd6\xfc7OL\x85*4j\xd8w\xfd\x89\xd3]+E\xd4uy\x02\x9bv\xce\x96l\b\xc4\xae\xe8\x02\xc7\xc7\\.\xa2\x87\xf4D\xb2\xd4L\x00\x00\x00\x00\xfa<\b\xf0\xb4+\x15\xdd\x19*\x8d\xff\xc0\x80\x86\x90`\xd4\xb6\xfe\x9b\x17\xa4\x9d\x83T\xf6\t\xd9)\x92\x10\t\xe8XQPba\x8f)M\xe0*\x11\xbf\xf2\xc6\x0e\xde\x83\xc2\xe6\xb28\x84%\x7fy\xd4\x8b\x13\x11\xde\x17\xaf\x8c\xd2\xb4\xa5\xa1~>\x838\rI\xe4\xc3\xbb\xb4@w\x83\f\x02\x9f\xd1\x9a\x1bz)\x9fT\x06\xdf\xa6\xb1\'\xf107Gy\x90&\xd4\xa2\xa6\xe4\x05\xa5\"\xf4\x90.\xeb\xa0Q\x1c\x83\xa8Z\xe4\x94B\xd3\xfc\\\rxzs\xbf\xb4\xc2\xcd\x97|p\x92E\xb7\xab\x9c\xd2=\xca\xa12\x0e>\xc4\xdb\xfb\x03\xba\t?\xf0\xf84\x80\x9a\xc3\x83\x0f\x80E!n\x0fU\x85\x19^X\xc5Bt+\xb4\xc7<\xf0\x17\xb6WC\x91\x0e\xd90}U+\xc0\x1d\x93\xc2 \x19\n\xcb\xd1x\xb3\xcb\x03W\xfe\xc7\xc7\xba\x13\x8a\xcc\x11\xb8J\"\x9f\xf5\x00~\xf8\x97\xdfG\xef\xecz\xc1$\xeak\xdf\xf6\xcb\xf9\xe7\xccn*Q\x9f8\x9dc\xf9\x81\\>\xcb\xa3.]\x13\x1e\xa85\xcb6\xady\xd8\xfd\x97\xcdV\xcaMo\x93\xc7\xae\x8b#Q\xe7\xa6X\x1dz\r\xb7O\xbfR1\xf4\x01\xae\x83v\xa4P\xd8D\x9d\x96\xfcj\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xbc\x05\xe1%\xe6\xc8\xc9\xd2\xdf-L\x8c\x87\x1e\x8d\x98\xd2s\x91\xd6\x02\x0e\xe0\x8a\xb31\xcb\xfes)\xa0\\0\xf8\xab\x0f\xa7J\xafT?g\xa0\xe3\x9b>\xc8s \x7f\xd5', 0x6) write(r2, &(0x7f0000000040)='/', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) r9 = socket$inet(0x2, 0x3, 0x2) r10 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r10, 0x0, 0xca, &(0x7f0000000000), 0x10) r11 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_int(r11, 0x0, 0xca, &(0x7f0000000000), 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r12, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x1f000000) setsockopt$inet_int(r11, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast1}}}, 0x88) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r13 = socket(0x10, 0x3, 0x0) sendmsg$netlink(r13, &(0x7f0000004800)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="180000001c001100000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7fbbe842ae9ac8874a4e3ab3fbe504a99b441fccb2a916944434456369289f9b6670713099ffa03975a3d844114e9c7e07599e9c35c48074c36d957e51fa19faf946cc0800000042d5ecc79649a3408dadd7ee03623fdf1253fc4a74"], 0x3}, {&(0x7f00000004c0)=ANY=[@ANYBLOB="100000000000040000445f7b17a49d56874ee9445dbe0c2df3d53bd8ff53447a1057b8460c809520887de5eb25b3a6b6b87e1550085fa390329bcbdb1b766ff90fdf6e4b4f77c52046101a11cddf483c45f5c39edcd57d"], 0x1}], 0x2}, 0x0) getsockopt$packet_int(r13, 0x107, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) 11:11:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d5001475000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:33 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000600)) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1f}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001040)='#vmnet1nodevem1\x00\xb9\x05\x98 \x8e\xf1\x91e\x12\xcfxu4H\x91\xbbl\xcd\xf1n\x99s\xcc\x7f\x06\x00w\x835k\xc0#\xd6\x80\x00\x8d\xc2\xc0<\xbd*\xe9Y\x82\xfa\x02\xd5\xd5\xe5<\xc2i\x11\xce\xf1\x9f\x14\xd7E\x1561]\xab\xe7\xf5\x1bCv\xee\xb4#\xf5dD!\xf4\xffiu\x00\xa5\xe7\xef\xdbc\xdd\x03\x00\x00\x00\xa2\n\x06^\x01\xd04$qd,\'HI\x9e\x8f\f1\x86.+6^\xfe)\"\xba\xe74\xabG\xf5J\x00w\xa8\xae\x1a\x87\x04\xf0\x11\xff\x90\x85\x00\xa3\xb15u\x1e/\xbeaz\xf3\xf8\xd5\'\tj\xa5\xe7\x87\x11 \x84\xe3\xa1m\n\n\x180\xb4F\x85[\xfcv\"\x87\x88\xfa\xf0\xa3\xcf\xe6\xb6V6\x06\xbc>]\adp\t\x01\x8dTe!81\x91\x18D\xf3\x98\x82\x90`\xdb\xba\xd6\xfc7OL\x85*4j\xd8w\xfd\x89\xd3]+E\xd4uy\x02\x9bv\xce\x96l\b\xc4\xae\xe8\x02\xc7\xc7\\.\xa2\x87\xf4D\xb2\xd4L\x00\x00\x00\x00\xfa<\b\xf0\xb4+\x15\xdd\x19*\x8d\xff\xc0\x80\x86\x90`\xd4\xb6\xfe\x9b\x17\xa4\x9d\x83T\xf6\t\xd9)\x92\x10\t\xe8XQPba\x8f)M\xe0*\x11\xbf\xf2\xc6\x0e\xde\x83\xc2\xe6\xb28\x84%\x7fy\xd4\x8b\x13\x11\xde\x17\xaf\x8c\xd2\xb4\xa5\xa1~>\x838\rI\xe4\xc3\xbb\xb4@w\x83\f\x02\x9f\xd1\x9a\x1bz)\x9fT\x06\xdf\xa6\xb1\'\xf107Gy\x90&\xd4\xa2\xa6\xe4\x05\xa5\"\xf4\x90.\xeb\xa0Q\x1c\x83\xa8Z\xe4\x94B\xd3\xfc\\\rxzs\xbf\xb4\xc2\xcd\x97|p\x92E\xb7\xab\x9c\xd2=\xca\xa12\x0e>\xc4\xdb\xfb\x03\xba\t?\xf0\xf84\x80\x9a\xc3\x83\x0f\x80E!n\x0fU\x85\x19^X\xc5Bt+\xb4\xc7<\xf0\x17\xb6WC\x91\x0e\xd90}U+\xc0\x1d\x93\xc2 \x19\n\xcb\xd1x\xb3\xcb\x03W\xfe\xc7\xc7\xba\x13\x8a\xcc\x11\xb8J\"\x9f\xf5\x00~\xf8\x97\xdfG\xef\xecz\xc1$\xeak\xdf\xf6\xcb\xf9\xe7\xccn*Q\x9f8\x9dc\xf9\x81\\>\xcb\xa3.]\x13\x1e\xa85\xcb6\xady\xd8\xfd\x97\xcdV\xcaMo\x93\xc7\xae\x8b#Q\xe7\xa6X\x1dz\r\xb7O\xbfR1\xf4\x01\xae\x83v\xa4P\xd8D\x9d\x96\xfcj\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xbc\x05\xe1%\xe6\xc8\xc9\xd2\xdf-L\x8c\x87\x1e\x8d\x98\xd2s\x91\xd6\x02\x0e\xe0\x8a\xb31\xcb\xfes)\xa0\\0\xf8\xab\x0f\xa7J\xafT?g\xa0\xe3\x9b>\xc8s \x7f\xd5', 0x6) write(r2, &(0x7f0000000040)='/', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) r9 = socket$inet(0x2, 0x3, 0x2) r10 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r10, 0x0, 0xca, &(0x7f0000000000), 0x10) r11 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_int(r11, 0x0, 0xca, &(0x7f0000000000), 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r12, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x1f000000) setsockopt$inet_int(r11, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast1}}}, 0x88) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r13 = socket(0x10, 0x3, 0x0) sendmsg$netlink(r13, &(0x7f0000004800)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="180000001c001100000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7fbbe842ae9ac8874a4e3ab3fbe504a99b441fccb2a916944434456369289f9b6670713099ffa03975a3d844114e9c7e07599e9c35c48074c36d957e51fa19faf946cc0800000042d5ecc79649a3408dadd7ee03623fdf1253fc4a74"], 0x3}, {&(0x7f00000004c0)=ANY=[@ANYBLOB="100000000000040000445f7b17a49d56874ee9445dbe0c2df3d53bd8ff53447a1057b8460c809520887de5eb25b3a6b6b87e1550085fa390329bcbdb1b766ff90fdf6e4b4f77c52046101a11cddf483c45f5c39edcd57d"], 0x1}], 0x2}, 0x0) getsockopt$packet_int(r13, 0x107, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) 11:11:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TCXONC(r2, 0x4b30, 0x0) 11:11:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x7, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d5001475000000", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:33 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000100)={&(0x7f0000000040)=[0x0], 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') writev(r1, &(0x7f0000000080), 0x5b) 11:11:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x21, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000009c0)={0x0, 0x8400, &(0x7f0000000980)={&(0x7f00000007c0)={0x14, r1, 0xffff}, 0x14}}, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) syz_genetlink_get_family_id$fou(0x0) 11:11:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d5001475000000000707", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x2c, &(0x7f0000000040), 0x20a154f6) 11:11:33 executing program 0: r0 = inotify_init() r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00', 0x3b}) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) 11:11:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 11:11:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) syz_open_dev$usbfs(0x0, 0x0, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000180)) 11:11:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d5001475000000000707", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) [ 572.794041][T23289] UBIFS error (pid: 23289): cannot open "(null)", error -22 [ 576.032337][T23460] input: syz0 as /devices/virtual/input/input48 11:11:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000080)=""/153) 11:11:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x2, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) [ 576.272115][T23476] usb usb7: usbfs: process 23476 (syz-executor.3) did not claim interface 0 before use [ 576.295198][T23478] input: syz0 as /devices/virtual/input/input49 11:11:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d5001475000000000707", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) [ 576.374150][T23476] usb usb7: usbfs: process 23476 (syz-executor.3) did not claim interface 0 before use 11:11:34 executing program 0: r0 = inotify_init() r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00', 0x3b}) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) 11:11:34 executing program 3: r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x3b, &(0x7f0000000040), 0x20a154f6) [ 576.544576][T23489] usb usb7: usbfs: process 23489 (syz-executor.5) did not claim interface 0 before use 11:11:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x15) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000007c0)={0x14, r1, 0xffff}, 0x14}}, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_SIOCSIFBR(r2, 0x8941, 0x0) syz_genetlink_get_family_id$fou(0x0) 11:11:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x3, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) [ 576.671402][T23497] input: syz0 as /devices/virtual/input/input50 11:11:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d500147500000000070700", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) 11:11:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TCXONC(r2, 0x4b6c, 0x0) 11:11:34 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDFONTOP_SET(r0, 0x4b70, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 11:11:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x4, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:11:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d500147500000000070700", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) [ 576.999741][T23514] usb usb7: usbfs: process 23514 (syz-executor.5) did not claim interface 0 before use 11:11:35 executing program 3: r0 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xf, &(0x7f0000000040), 0x20a154f6) 11:11:35 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) 11:11:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x5, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:35 executing program 0: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:11:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TCXONC(r2, 0x560f, 0x0) 11:11:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf009}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c000729d500147500000000070700", @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) 11:11:35 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) socket$netlink(0x10, 0x3, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={0x0, 0x0, 0x96}, 0x0, 0x0, &(0x7f0000000500)=""/150) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, &(0x7f0000000000)) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) socket(0x0, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000180)) 11:11:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x40010042, 0x0, 0x0) 11:11:35 executing program 3: dup(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f3a191b47745de8c6db5e888a1618f3ef819b968ea85bdc6d45c0f8c5924b3d23401f4e375c979ed4194060bb64a006fbca55271b0815f2b095b5abae2ea9d875fd9c52d747586cc16ff9d85f89b9b152cb4d032337aa9860a45c04508d1c47639fef6e4b5274a8e97861ec9e2e20c8", 0x83}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff6e, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:11:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x6, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:35 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)=ANY=[]) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x1e0, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) io_setup(0x239, &(0x7f00000000c0)=0x0) io_pgetevents(r2, 0x3, 0x6, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000005c0)={&(0x7f0000000280)={[0xfffffffffffffffa]}, 0x8}) ioctl$USBDEVFS_RESET(r0, 0x5514) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x1e0, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000600)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000f0603070000"], 0x1}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x4001) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x7d, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, &(0x7f0000000140)=0x20) socket$inet6_sctp(0xa, 0x801, 0x84) 11:11:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x64, 0x3, 0x238, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, '\x00', 'caif0\x00'}, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x298) 11:11:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) [ 577.769731][T23571] Cannot find add_set index 0 as target 11:11:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) 11:11:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000540)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) [ 577.912235][T23575] xt_TCPMSS: Only works on TCP SYN packets 11:11:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x7, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:36 executing program 4: r0 = socket(0x1e, 0x805, 0x0) connect$llc(r0, 0x0, 0x0) [ 578.084821][T23583] usb usb7: usbfs: process 23583 (syz-executor.5) did not claim interface 0 before use [ 578.111299][T23585] Cannot find add_set index 0 as target [ 578.148175][T23586] input: syz0 as /devices/virtual/input/input51 11:11:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) [ 578.230026][T23586] input: syz0 as /devices/virtual/input/input52 11:11:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x21, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:36 executing program 4: r0 = fsopen(&(0x7f0000000000)='fuseblk\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='securityvboxnet0\\', &(0x7f00000000c0)='[[(\x00', 0x0) [ 578.467491][T23600] Cannot find add_set index 0 as target [ 578.506530][T23604] usb usb7: usbfs: process 23604 (syz-executor.5) did not claim interface 0 before use 11:11:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f0000000200)={0xa, 0x3, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000100)=""/212, 0xd4, 0x40010042, 0x0, 0x0) 11:11:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(r0, 0x0, 0x0, 0x4) 11:11:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) 11:11:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:36 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x551f, 0x0) 11:11:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x300, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:36 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) [ 578.883805][T23623] Cannot find add_set index 0 as target [ 578.920684][T23626] usb usb7: usbfs: process 23626 (syz-executor.5) did not claim interface 0 before use 11:11:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TCXONC(r2, 0x5606, 0x0) 11:11:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x500, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) 11:11:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(r0, 0x0, 0x0, 0x4) 11:11:37 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) [ 579.188900][T23641] Cannot find add_set index 0 as target 11:11:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x60, 0x30, 0x17b, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_bpf={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0x4}}}]}]}, 0x60}}, 0x0) [ 579.306942][T23648] usb usb7: usbfs: process 23648 (syz-executor.5) did not claim interface 0 before use 11:11:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:11:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(r0, 0x0, 0x0, 0x4) 11:11:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x600, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:37 executing program 5: r0 = eventfd2(0x0, 0x1) r1 = dup(r0) read$FUSE(r1, &(0x7f0000000280), 0x1000) r2 = dup(r1) write$tun(r2, &(0x7f0000000000)={@val, @val={0x0, 0x0, 0x9}, @ipv6=@dccp_packet={0x0, 0x6, "101594", 0x10, 0x21, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="950c8860d48fa11a05f45fb7299fb4d1", {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bd4535", 0x0, "c2e33f"}}}}}, 0x46) 11:11:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={0x0, 0x0, 0x96}, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x0, &(0x7f0000000500)=""/150) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000000)) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x7a1c80, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) socket(0x10, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000180)) [ 579.623773][T23666] Cannot find add_set index 0 as target 11:11:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:37 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x4b, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) 11:11:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(r0, 0x0, 0x0, 0x4) [ 579.736610][T23672] usb usb7: usbfs: process 23672 (syz-executor.4) did not claim interface 0 before use 11:11:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x700, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) [ 579.843269][T23678] Cannot find add_set index 0 as target [ 579.874872][T23672] usb usb7: usbfs: process 23672 (syz-executor.4) did not claim interface 0 before use 11:11:37 executing program 5: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 11:11:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={0x0, 0x0, 0x96}, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x0, &(0x7f0000000500)=""/150) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000000)) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x7a1c80, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) socket(0x10, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000180)) 11:11:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={0x0, 0x0, 0x96}, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x0, &(0x7f0000000500)=""/150) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000000)) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x7a1c80, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) socket(0x10, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000180)) 11:11:38 executing program 3: pread64(0xffffffffffffffff, 0x0, 0x0, 0x4) [ 580.074194][T23693] usb usb7: usbfs: process 23693 (syz-executor.4) did not claim interface 0 before use 11:11:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x2100, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={0x0, 0x0, 0x96}, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x0, &(0x7f0000000500)=""/150) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000000)) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x7a1c80, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) socket(0x10, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000180)) [ 580.302216][T23703] Cannot find add_set index 0 as target [ 580.314892][T23701] usb usb7: usbfs: process 23701 (syz-executor.2) did not claim interface 0 before use 11:11:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x2000000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 11:11:38 executing program 3: pread64(0xffffffffffffffff, 0x0, 0x0, 0x4) 11:11:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) [ 580.409459][T23708] usb usb7: usbfs: process 23708 (syz-executor.4) did not claim interface 0 before use 11:11:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={0x0, 0x0, 0x96}, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x0, &(0x7f0000000500)=""/150) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000000)) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x7a1c80, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) socket(0x10, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000180)) 11:11:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x9, 0x6, 0x101, 0x0, 0x0, {0x1}, [@IPSET_ATTR_DATA={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8010}, 0x4040) 11:11:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x3f00, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 580.642219][T23722] Cannot find add_set index 0 as target 11:11:38 executing program 3: pread64(0xffffffffffffffff, 0x0, 0x0, 0x4) 11:11:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:38 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000600)) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1f}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001040)='#vmnet1nodevem1\x00\xb9\x05\x98 \x8e\xf1\x91e\x12\xcfxu4H\x91\xbbl\xcd\xf1n\x99s\xcc\x7f\x06\x00w\x835k\xc0#\xd6\x80\x00\x8d\xc2\xc0<\xbd*\xe9Y\x82\xfa\x02\xd5\xd5\xe5<\xc2i\x11\xce\xf1\x9f\x14\xd7E\x1561]\xab\xe7\xf5\x1bCv\xee\xb4#\xf5dD!\xf4\xffiu\x00\xa5\xe7\xef\xdbc\xdd\x03\x00\x00\x00\xa2\n\x06^\x01\xd04$qd,\'HI\x9e\x8f\f1\x86.+6^\xfe)\"\xba\xe74\xabG\xf5J\x00w\xa8\xae\x1a\x87\x04\xf0\x11\xff\x90\x85\x00\xa3\xb15u\x1e/\xbeaz\xf3\xf8\xd5\'\tj\xa5\xe7\x87\x11 \x84\xe3\xa1m\n\n\x180\xb4F\x85[\xfcv\"\x87\x88\xfa\xf0\xa3\xcf\xe6\xb6V6\x06\xbc>]\adp\t\x01\x8dTe!81\x91\x18D\xf3\x98\x82\x90`\xdb\xba\xd6\xfc7OL\x85*4j\xd8w\xfd\x89\xd3]+E\xd4uy\x02\x9bv\xce\x96l\b\xc4\xae\xe8\x02\xc7\xc7\\.\xa2\x87\xf4D\xb2\xd4L\x00\x00\x00\x00\xfa<\b\xf0\xb4+\x15\xdd\x19*\x8d\xff\xc0\x80\x86\x90`\xd4\xb6\xfe\x9b\x17\xa4\x9d\x83T\xf6\t\xd9)\x92\x10\t\xe8XQPba\x8f)M\xe0*\x11\xbf\xf2\xc6\x0e\xde\x83\xc2\xe6\xb28\x84%\x7fy\xd4\x8b\x13\x11\xde\x17\xaf\x8c\xd2\xb4\xa5\xa1~>\x838\rI\xe4\xc3\xbb\xb4@w\x83\f\x02\x9f\xd1\x9a\x1bz)\x9fT\x06\xdf\xa6\xb1\'\xf107Gy\x90&\xd4\xa2\xa6\xe4\x05\xa5\"\xf4\x90.\xeb\xa0Q\x1c\x83\xa8Z\xe4\x94B\xd3\xfc\\\rxzs\xbf\xb4\xc2\xcd\x97|p\x92E\xb7\xab\x9c\xd2=\xca\xa12\x0e>\xc4\xdb\xfb\x03\xba\t?\xf0\xf84\x80\x9a\xc3\x83\x0f\x80E!n\x0fU\x85\x19^X\xc5Bt+\xb4\xc7<\xf0\x17\xb6WC\x91\x0e\xd90}U+\xc0\x1d\x93\xc2 \x19\n\xcb\xd1x\xb3\xcb\x03W\xfe\xc7\xc7\xba\x13\x8a\xcc\x11\xb8J\"\x9f\xf5\x00~\xf8\x97\xdfG\xef\xecz\xc1$\xeak\xdf\xf6\xcb\xf9\xe7\xccn*Q\x9f8\x9dc\xf9\x81\\>\xcb\xa3.]\x13\x1e\xa85\xcb6\xady\xd8\xfd\x97\xcdV\xcaMo\x93\xc7\xae\x8b#Q\xe7\xa6X\x1dz\r\xb7O\xbfR1\xf4\x01\xae\x83v\xa4P\xd8D\x9d\x96\xfcj\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xbc\x05\xe1%\xe6\xc8\xc9\xd2\xdf-L\x8c\x87\x1e\x8d\x98\xd2s\x91\xd6\x02\x0e\xe0\x8a\xb31\xcb\xfes)\xa0\\0\xf8\xab\x0f\xa7J\xafT?g\xa0\xe3\x9b>\xc8s \x7f\xd5', 0x6) write(r2, &(0x7f0000000040)='/', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) r9 = socket$inet(0x2, 0x3, 0x2) r10 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r10, 0x0, 0xca, &(0x7f0000000000), 0x10) r11 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_int(r11, 0x0, 0xca, &(0x7f0000000000), 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r12, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x1f000000) setsockopt$inet_int(r11, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast1}}}, 0x88) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 580.826720][T23731] usb usb7: usbfs: process 23731 (syz-executor.4) did not claim interface 0 before use 11:11:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0x2, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 580.934684][T23737] Cannot find add_set index 0 as target 11:11:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:39 executing program 4: clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x128, 0x128, 0x128, 0x0, 0x128, 0x218, 0x218, 0x218, 0x218, 0x218, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x100, 0x128, 0x0, {}, [@common=@inet=@socket1={{0x28, 'socket\x00'}}, @common=@inet=@l2tp={{0x30, 'l2tp\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 11:11:39 executing program 3: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, 0x0, 0x0, 0x4) 11:11:39 executing program 3: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, 0x0, 0x0, 0x4) 11:11:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0x3, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 581.309386][T23756] xt_l2tp: invalid flags combination: 0 11:11:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:39 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000008c0)={0x0, 0x0, 0x2, 0x0, [], [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {0x801, 0x0, 0x80000001}], [[], []]}) 11:11:39 executing program 3: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, 0x0, 0x0, 0x4) 11:11:39 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000600)) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1f}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001040)='#vmnet1nodevem1\x00\xb9\x05\x98 \x8e\xf1\x91e\x12\xcfxu4H\x91\xbbl\xcd\xf1n\x99s\xcc\x7f\x06\x00w\x835k\xc0#\xd6\x80\x00\x8d\xc2\xc0<\xbd*\xe9Y\x82\xfa\x02\xd5\xd5\xe5<\xc2i\x11\xce\xf1\x9f\x14\xd7E\x1561]\xab\xe7\xf5\x1bCv\xee\xb4#\xf5dD!\xf4\xffiu\x00\xa5\xe7\xef\xdbc\xdd\x03\x00\x00\x00\xa2\n\x06^\x01\xd04$qd,\'HI\x9e\x8f\f1\x86.+6^\xfe)\"\xba\xe74\xabG\xf5J\x00w\xa8\xae\x1a\x87\x04\xf0\x11\xff\x90\x85\x00\xa3\xb15u\x1e/\xbeaz\xf3\xf8\xd5\'\tj\xa5\xe7\x87\x11 \x84\xe3\xa1m\n\n\x180\xb4F\x85[\xfcv\"\x87\x88\xfa\xf0\xa3\xcf\xe6\xb6V6\x06\xbc>]\adp\t\x01\x8dTe!81\x91\x18D\xf3\x98\x82\x90`\xdb\xba\xd6\xfc7OL\x85*4j\xd8w\xfd\x89\xd3]+E\xd4uy\x02\x9bv\xce\x96l\b\xc4\xae\xe8\x02\xc7\xc7\\.\xa2\x87\xf4D\xb2\xd4L\x00\x00\x00\x00\xfa<\b\xf0\xb4+\x15\xdd\x19*\x8d\xff\xc0\x80\x86\x90`\xd4\xb6\xfe\x9b\x17\xa4\x9d\x83T\xf6\t\xd9)\x92\x10\t\xe8XQPba\x8f)M\xe0*\x11\xbf\xf2\xc6\x0e\xde\x83\xc2\xe6\xb28\x84%\x7fy\xd4\x8b\x13\x11\xde\x17\xaf\x8c\xd2\xb4\xa5\xa1~>\x838\rI\xe4\xc3\xbb\xb4@w\x83\f\x02\x9f\xd1\x9a\x1bz)\x9fT\x06\xdf\xa6\xb1\'\xf107Gy\x90&\xd4\xa2\xa6\xe4\x05\xa5\"\xf4\x90.\xeb\xa0Q\x1c\x83\xa8Z\xe4\x94B\xd3\xfc\\\rxzs\xbf\xb4\xc2\xcd\x97|p\x92E\xb7\xab\x9c\xd2=\xca\xa12\x0e>\xc4\xdb\xfb\x03\xba\t?\xf0\xf84\x80\x9a\xc3\x83\x0f\x80E!n\x0fU\x85\x19^X\xc5Bt+\xb4\xc7<\xf0\x17\xb6WC\x91\x0e\xd90}U+\xc0\x1d\x93\xc2 \x19\n\xcb\xd1x\xb3\xcb\x03W\xfe\xc7\xc7\xba\x13\x8a\xcc\x11\xb8J\"\x9f\xf5\x00~\xf8\x97\xdfG\xef\xecz\xc1$\xeak\xdf\xf6\xcb\xf9\xe7\xccn*Q\x9f8\x9dc\xf9\x81\\>\xcb\xa3.]\x13\x1e\xa85\xcb6\xady\xd8\xfd\x97\xcdV\xcaMo\x93\xc7\xae\x8b#Q\xe7\xa6X\x1dz\r\xb7O\xbfR1\xf4\x01\xae\x83v\xa4P\xd8D\x9d\x96\xfcj\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xbc\x05\xe1%\xe6\xc8\xc9\xd2\xdf-L\x8c\x87\x1e\x8d\x98\xd2s\x91\xd6\x02\x0e\xe0\x8a\xb31\xcb\xfes)\xa0\\0\xf8\xab\x0f\xa7J\xafT?g\xa0\xe3\x9b>\xc8s \x7f\xd5', 0x6) write(r2, &(0x7f0000000040)='/', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) r9 = socket$inet(0x2, 0x3, 0x2) r10 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r10, 0x0, 0xca, &(0x7f0000000000), 0x10) r11 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_int(r11, 0x0, 0xca, &(0x7f0000000000), 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r12, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x1f000000) setsockopt$inet_int(r11, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast1}}}, 0x88) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 11:11:39 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:39 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000600)) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1f}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001040)='#vmnet1nodevem1\x00\xb9\x05\x98 \x8e\xf1\x91e\x12\xcfxu4H\x91\xbbl\xcd\xf1n\x99s\xcc\x7f\x06\x00w\x835k\xc0#\xd6\x80\x00\x8d\xc2\xc0<\xbd*\xe9Y\x82\xfa\x02\xd5\xd5\xe5<\xc2i\x11\xce\xf1\x9f\x14\xd7E\x1561]\xab\xe7\xf5\x1bCv\xee\xb4#\xf5dD!\xf4\xffiu\x00\xa5\xe7\xef\xdbc\xdd\x03\x00\x00\x00\xa2\n\x06^\x01\xd04$qd,\'HI\x9e\x8f\f1\x86.+6^\xfe)\"\xba\xe74\xabG\xf5J\x00w\xa8\xae\x1a\x87\x04\xf0\x11\xff\x90\x85\x00\xa3\xb15u\x1e/\xbeaz\xf3\xf8\xd5\'\tj\xa5\xe7\x87\x11 \x84\xe3\xa1m\n\n\x180\xb4F\x85[\xfcv\"\x87\x88\xfa\xf0\xa3\xcf\xe6\xb6V6\x06\xbc>]\adp\t\x01\x8dTe!81\x91\x18D\xf3\x98\x82\x90`\xdb\xba\xd6\xfc7OL\x85*4j\xd8w\xfd\x89\xd3]+E\xd4uy\x02\x9bv\xce\x96l\b\xc4\xae\xe8\x02\xc7\xc7\\.\xa2\x87\xf4D\xb2\xd4L\x00\x00\x00\x00\xfa<\b\xf0\xb4+\x15\xdd\x19*\x8d\xff\xc0\x80\x86\x90`\xd4\xb6\xfe\x9b\x17\xa4\x9d\x83T\xf6\t\xd9)\x92\x10\t\xe8XQPba\x8f)M\xe0*\x11\xbf\xf2\xc6\x0e\xde\x83\xc2\xe6\xb28\x84%\x7fy\xd4\x8b\x13\x11\xde\x17\xaf\x8c\xd2\xb4\xa5\xa1~>\x838\rI\xe4\xc3\xbb\xb4@w\x83\f\x02\x9f\xd1\x9a\x1bz)\x9fT\x06\xdf\xa6\xb1\'\xf107Gy\x90&\xd4\xa2\xa6\xe4\x05\xa5\"\xf4\x90.\xeb\xa0Q\x1c\x83\xa8Z\xe4\x94B\xd3\xfc\\\rxzs\xbf\xb4\xc2\xcd\x97|p\x92E\xb7\xab\x9c\xd2=\xca\xa12\x0e>\xc4\xdb\xfb\x03\xba\t?\xf0\xf84\x80\x9a\xc3\x83\x0f\x80E!n\x0fU\x85\x19^X\xc5Bt+\xb4\xc7<\xf0\x17\xb6WC\x91\x0e\xd90}U+\xc0\x1d\x93\xc2 \x19\n\xcb\xd1x\xb3\xcb\x03W\xfe\xc7\xc7\xba\x13\x8a\xcc\x11\xb8J\"\x9f\xf5\x00~\xf8\x97\xdfG\xef\xecz\xc1$\xeak\xdf\xf6\xcb\xf9\xe7\xccn*Q\x9f8\x9dc\xf9\x81\\>\xcb\xa3.]\x13\x1e\xa85\xcb6\xady\xd8\xfd\x97\xcdV\xcaMo\x93\xc7\xae\x8b#Q\xe7\xa6X\x1dz\r\xb7O\xbfR1\xf4\x01\xae\x83v\xa4P\xd8D\x9d\x96\xfcj\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xbc\x05\xe1%\xe6\xc8\xc9\xd2\xdf-L\x8c\x87\x1e\x8d\x98\xd2s\x91\xd6\x02\x0e\xe0\x8a\xb31\xcb\xfes)\xa0\\0\xf8\xab\x0f\xa7J\xafT?g\xa0\xe3\x9b>\xc8s \x7f\xd5', 0x6) write(r2, &(0x7f0000000040)='/', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) r9 = socket$inet(0x2, 0x3, 0x2) r10 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r10, 0x0, 0xca, &(0x7f0000000000), 0x10) r11 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_int(r11, 0x0, 0xca, &(0x7f0000000000), 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r12, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x1f000000) setsockopt$inet_int(r11, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast1}}}, 0x88) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 11:11:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0x4, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x4) 11:11:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0x5, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x4) 11:11:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:40 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000600)) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1f}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000001040)='#vmnet1nodevem1\x00\xb9\x05\x98 \x8e\xf1\x91e\x12\xcfxu4H\x91\xbbl\xcd\xf1n\x99s\xcc\x7f\x06\x00w\x835k\xc0#\xd6\x80\x00\x8d\xc2\xc0<\xbd*\xe9Y\x82\xfa\x02\xd5\xd5\xe5<\xc2i\x11\xce\xf1\x9f\x14\xd7E\x1561]\xab\xe7\xf5\x1bCv\xee\xb4#\xf5dD!\xf4\xffiu\x00\xa5\xe7\xef\xdbc\xdd\x03\x00\x00\x00\xa2\n\x06^\x01\xd04$qd,\'HI\x9e\x8f\f1\x86.+6^\xfe)\"\xba\xe74\xabG\xf5J\x00w\xa8\xae\x1a\x87\x04\xf0\x11\xff\x90\x85\x00\xa3\xb15u\x1e/\xbeaz\xf3\xf8\xd5\'\tj\xa5\xe7\x87\x11 \x84\xe3\xa1m\n\n\x180\xb4F\x85[\xfcv\"\x87\x88\xfa\xf0\xa3\xcf\xe6\xb6V6\x06\xbc>]\adp\t\x01\x8dTe!81\x91\x18D\xf3\x98\x82\x90`\xdb\xba\xd6\xfc7OL\x85*4j\xd8w\xfd\x89\xd3]+E\xd4uy\x02\x9bv\xce\x96l\b\xc4\xae\xe8\x02\xc7\xc7\\.\xa2\x87\xf4D\xb2\xd4L\x00\x00\x00\x00\xfa<\b\xf0\xb4+\x15\xdd\x19*\x8d\xff\xc0\x80\x86\x90`\xd4\xb6\xfe\x9b\x17\xa4\x9d\x83T\xf6\t\xd9)\x92\x10\t\xe8XQPba\x8f)M\xe0*\x11\xbf\xf2\xc6\x0e\xde\x83\xc2\xe6\xb28\x84%\x7fy\xd4\x8b\x13\x11\xde\x17\xaf\x8c\xd2\xb4\xa5\xa1~>\x838\rI\xe4\xc3\xbb\xb4@w\x83\f\x02\x9f\xd1\x9a\x1bz)\x9fT\x06\xdf\xa6\xb1\'\xf107Gy\x90&\xd4\xa2\xa6\xe4\x05\xa5\"\xf4\x90.\xeb\xa0Q\x1c\x83\xa8Z\xe4\x94B\xd3\xfc\\\rxzs\xbf\xb4\xc2\xcd\x97|p\x92E\xb7\xab\x9c\xd2=\xca\xa12\x0e>\xc4\xdb\xfb\x03\xba\t?\xf0\xf84\x80\x9a\xc3\x83\x0f\x80E!n\x0fU\x85\x19^X\xc5Bt+\xb4\xc7<\xf0\x17\xb6WC\x91\x0e\xd90}U+\xc0\x1d\x93\xc2 \x19\n\xcb\xd1x\xb3\xcb\x03W\xfe\xc7\xc7\xba\x13\x8a\xcc\x11\xb8J\"\x9f\xf5\x00~\xf8\x97\xdfG\xef\xecz\xc1$\xeak\xdf\xf6\xcb\xf9\xe7\xccn*Q\x9f8\x9dc\xf9\x81\\>\xcb\xa3.]\x13\x1e\xa85\xcb6\xady\xd8\xfd\x97\xcdV\xcaMo\x93\xc7\xae\x8b#Q\xe7\xa6X\x1dz\r\xb7O\xbfR1\xf4\x01\xae\x83v\xa4P\xd8D\x9d\x96\xfcj\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xbc\x05\xe1%\xe6\xc8\xc9\xd2\xdf-L\x8c\x87\x1e\x8d\x98\xd2s\x91\xd6\x02\x0e\xe0\x8a\xb31\xcb\xfes)\xa0\\0\xf8\xab\x0f\xa7J\xafT?g\xa0\xe3\x9b>\xc8s \x7f\xd5', 0x6) write(r2, &(0x7f0000000040)='/', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x8, 0x0, 0x8000) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @local}, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x80f, 0x1) close(r8) splice(r7, 0x0, r8, 0x0, 0x80000001, 0x0) ioctl$PPPIOCSDEBUG(r7, 0x40047440, &(0x7f0000000080)=0xfffffffffffffffe) r9 = socket$inet(0x2, 0x3, 0x2) r10 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r10, 0x0, 0xca, &(0x7f0000000000), 0x10) r11 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_int(r11, 0x0, 0xca, &(0x7f0000000000), 0x10) r12 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r12, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x1f000000) setsockopt$inet_int(r11, 0x0, 0x32, &(0x7f0000000040)=0xfffffffffffffffd, 0x8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast1}}}, 0x88) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 11:11:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x4) 11:11:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TCXONC(r2, 0x4b64, 0x0) 11:11:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0x6, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x0, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(r0, 0x0, 0x0, 0x0) 11:11:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000180)) [ 582.756219][T23841] fuse: Bad value for 'fd' 11:11:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0x2c, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 582.996222][T23852] usb usb7: usbfs: process 23852 (syz-executor.4) did not claim interface 0 before use [ 583.060678][T23855] set_target_v1_checkentry: 3 callbacks suppressed [ 583.060687][T23855] Cannot find add_set index 0 as target 11:11:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x80801, 0x3) accept(r2, 0x0, 0x0) 11:11:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(r0, 0x0, 0x0, 0x0) 11:11:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000180)) 11:11:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 583.383908][T23872] usb usb7: usbfs: process 23872 (syz-executor.4) did not claim interface 0 before use 11:11:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/nf_conntrack_expect\x00') pread64(r0, 0x0, 0x0, 0x0) [ 583.441201][T23884] Cannot find add_set index 0 as target 11:11:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TCXONC(r2, 0x4b61, 0x0) 11:11:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x2, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000100)='dns_resolver\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000180)) 11:11:41 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$KDFONTOP_SET(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 11:11:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 583.778540][T23904] Cannot find add_set index 0 as target 11:11:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x3, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$TCXONC(r2, 0x4b61, 0x0) [ 583.853464][T23906] usb usb7: usbfs: process 23906 (syz-executor.4) did not claim interface 0 before use 11:11:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x80003, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0xeb}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:11:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) [ 584.140806][T23925] Cannot find add_set index 0 as target 11:11:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x80003, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:42 executing program 2: open(0x0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = creat(&(0x7f0000000480)='./bus/file0\x00', 0x81) read$eventfd(r1, 0x0, 0x0) fallocate(r0, 0x0, 0xfa9, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000002c0)=""/106) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000640)) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f00000000c0)={r8}, 0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x5}, 0x8) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f00000001c0)={0x5, &(0x7f0000000080)=[{0xfffb, 0x6, 0x4, 0x80}, {0xb6b, 0x2, 0x0, 0x932f}, {0x0, 0x56, 0x6, 0x1}, {0x700, 0x1, 0x8, 0x157e}, {0x1, 0x40}]}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000180), 0x4) r10 = dup(r4) setsockopt$inet6_tcp_int(r10, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000600)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x396, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x800fe) sendfile(r10, r11, 0x0, 0x8000fffffffe) 11:11:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x4, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLERRORu(r1, 0x0, 0x0) 11:11:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = dup2(r0, r0) write$9p(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000340)='gid_map\x00') r2 = gettid() tkill(r2, 0x1000000000015) [ 584.371786][T23943] Cannot find add_set index 0 as target 11:11:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x80003, 0x6b) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x5, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x0, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) [ 584.652493][T23960] Cannot find add_set index 0 as target 11:11:42 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80045518, &(0x7f0000000000)) 11:11:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = dup2(r0, r0) write$9p(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000340)='gid_map\x00') r2 = gettid() tkill(r2, 0x1000000000015) 11:11:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x6, 0x0, @local}}]}, 0xa0}}, 0x0) [ 584.825927][ T26] audit: type=1800 audit(1582024302.832:90): pid=23949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17936 res=0 11:11:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) socket$inet6(0xa, 0x40000080806, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000340), 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) socket$inet6(0xa, 0x0, 0x0) socketpair(0x0, 0x0, 0xc1, &(0x7f0000000000)) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x72, &(0x7f0000000040), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) [ 584.909774][T23971] Cannot find add_set index 0 as target 11:11:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:43 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 11:11:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x0, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:43 executing program 4: socket(0x0, 0x3, 0x80000000002) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 11:11:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, 0x0) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x7, 0x0, @local}}]}, 0xa0}}, 0x0) [ 585.216072][T23996] Cannot find add_set index 0 as target [ 585.245868][T23984] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO 11:11:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x0, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) [ 585.334426][T23984] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 585.448614][T24011] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 585.484122][T24011] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 11:11:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x21, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:43 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 585.585769][T24025] Cannot find add_set index 0 as target 11:11:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a}, 0x24}}, 0x0) kcmp(0x0, r1, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, 0x0, &(0x7f0000000180)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r3 = syz_open_pts(r2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) unshare(0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) sched_setscheduler(r4, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:43 executing program 4: socket(0x0, 0x3, 0x80000000002) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 11:11:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, 0x0) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:43 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 585.929788][T24043] Cannot find add_set index 0 as target 11:11:44 executing program 4: socket(0x0, 0x3, 0x80000000002) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 11:11:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x300, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:44 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f00000002c0)) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-256-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140)="24c838593907000000", 0xffffffffffffff80, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-256-generic\x00'}, 0x58) 11:11:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x500, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:44 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) r3 = socket$inet6(0xa, 0x200000000003, 0x87) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 11:11:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:11:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x600, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:45 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) r3 = socket$inet6(0xa, 0x200000000003, 0x87) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 11:11:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x700, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0b") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) 11:11:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 587.591885][T24126] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 587.668571][T24126] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 11:11:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x7}, 0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) 11:11:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x2100, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0b") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffdc, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 2', 0x1b) [ 587.768047][T24126] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 587.788048][T24126] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 11:11:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) 11:11:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x3f00, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0b") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) [ 588.122156][T24146] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 588.168316][T24146] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 11:11:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) 11:11:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000540)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000080)='connect aa:aa:aa:aa:aa:11 2', 0x18) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 11:11:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 588.400446][T24166] set_target_v1_checkentry: 7 callbacks suppressed [ 588.400455][T24166] Cannot find add_set index 0 as target 11:11:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe847") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair(0x0, 0x6, 0xc1, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x72, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x10) dup3(r4, r5, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) 11:11:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 588.708964][T24178] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 588.726653][T24178] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 11:11:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x2, @local}}]}, 0xa0}}, 0x0) [ 588.895093][T24189] Cannot find add_set index 0 as target 11:11:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) [ 589.032810][T24192] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO 11:11:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe847") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 589.078194][T24192] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 589.126006][T24192] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 589.161231][T24192] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 11:11:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x3, @local}}]}, 0xa0}}, 0x0) [ 589.226343][T24205] Cannot find add_set index 0 as target 11:11:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair(0x0, 0x6, 0xc1, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x72, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x10) dup3(r4, r5, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) 11:11:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe847") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) [ 589.447380][T24214] Cannot find add_set index 0 as target 11:11:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair(0x0, 0x6, 0xc1, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x72, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x10) dup3(r4, r5, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) 11:11:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe84790") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x4, @local}}]}, 0xa0}}, 0x0) [ 589.528126][T24215] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO 11:11:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe84790") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) [ 589.630716][T24224] Cannot find add_set index 0 as target [ 589.652577][T24215] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 11:11:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x5, @local}}]}, 0xa0}}, 0x0) [ 589.747493][T24229] Cannot find add_set index 0 as target 11:11:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair(0x0, 0x6, 0xc1, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x72, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x10) dup3(r4, r5, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) 11:11:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe84790") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, &(0x7f0000000100)=0x131) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @local}}]}, 0xa0}}, 0x0) [ 589.964029][T24240] Cannot find add_set index 0 as target 11:11:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 11:11:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) preadv(r0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpid() r2 = getpid() socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$peek(0x2, r1, &(0x7f0000000180)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00001000800000000000000000003fde00"}) r4 = syz_open_pts(r3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x6) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x0, &(0x7f0000000380)) sched_setscheduler(r5, 0x6, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 11:11:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) [ 590.104635][T24243] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO 11:11:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x1f0, 0x220, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) [ 590.194119][T24243] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 11:11:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 11:11:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x7, @local}}]}, 0xa0}}, 0x0) 11:11:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 11:11:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 11:11:48 executing program 2: 11:11:48 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) r3 = socket$inet6(0xa, 0x200000000003, 0x87) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 11:11:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 11:11:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x21, @local}}]}, 0xa0}}, 0x0) 11:11:48 executing program 2: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x29, 0xb, 0x0, 0x0) 11:11:49 executing program 4: semget(0x1, 0x6, 0x200) 11:11:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/236, 0xec}], 0x1, 0x0) 11:11:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x160, 0x190, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) 11:11:49 executing program 3: r0 = socket(0x2, 0x2, 0x0) socket(0x0, 0x2, 0x0) connect$unix(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/909], 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) dup2(r0, r1) setsockopt$sock_int(r1, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r1) sendto$inet6(r2, &(0x7f0000000040), 0xffc9, 0x0, 0x0, 0xfffffffffffffe8c) 11:11:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x300, @local}}]}, 0xa0}}, 0x0) 11:11:49 executing program 4: syz_emit_ethernet(0x140, &(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="7810197dc071067201e878bdd3ad881ddf719bb338f6c51146dc83c065a76c15d02211395e4fc8773c44731b6f65047015e2f329a65bd67602bf25384964503273bb051771ed18ab14dc5dfe73968db69f284fae42f316dd1fa58b59673b6bb141c0d97001c0ee0d5416b7dffc2d758ccc7d81e01971f52832811921e0ab5322d6f1b4f15f88f5714157db479465de12a5d20b688ce23734983223090b84ddebcec3b9e02b05c300cb10cce5c674f8923c310fefd66d9b2c2096e2346261fc10f00860902bc3ee8afa3d8cc3727037c795f8db353e29c2e466a0"], 0x0) 11:11:49 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="380000002900000033000000010000005d04000000f47e5b233093744c2f74822bf66b0bffbefdd5646d04ee102bbc240ffc8bb42da5584cb63ee4afac6be18fbae9cf1e6874ba007ffd7ede58a995cea4d2d5489f45f8277445e612de990f7134054a521f52de55dc08c1cff05b74024aa308f9a6fa2454691775a568e0c78ba447b058e1"], 0x85}, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)="00d7ab06", 0x4) bind(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="01440f"], 0x1) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="82028180ffffffff"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e5e30df8f7adaffe92a2292e28449e7f83a1500000000e5aa5a99d558ef8e7aa8af841d87c22b438d216c7e01fdfba87cde782108afb1bd6db7a6a38c2421d7a999e7bf15972a38777d0a832c805b7b59f20bfc38ea0def45f6c8c1d77308d0b9793a14dbdeed9da40e52402223cb9ad8559e4a91c317e125b326e29c024db37c725dd7e5faceacb32928ca85ab"], 0x10) r1 = msgget$private(0x0, 0xfffffffffffffffb) msgsnd(r1, &(0x7f0000000180)={0x1, "3b10bd201b7630a5f690a9b351cc8eda1750f912a9e3fae046dc7b9f60da7679f993db0022e3f6c325ae11ab7b8fbf6de023ba7afd21c661eb8a6bf965e7c25105c0137670431b1402b9bec5667e57a149e294ec46a7dccfc108b9d519e4da6586de628e51404bf0e22fb6abf90f09ca6995da7210e88195b04459f21828c44f695a5dff0daa44c5310a93b6f46a94282eb2b6ded3329bd3d809de9399222e5d90bf2b98cf9d4a6b09428b7613d21ff35832cf349908177f27861803b0727fb65c3c72069a6c02c50b19e5c648c41abe891057eddbce1f082a"}, 0xe1, 0x0) getuid() openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x200b0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000600), &(0x7f0000000a00)=0x284) 11:11:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x160, 0x190, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) 11:11:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x0) 11:11:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x0) 11:11:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x160, 0x190, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv4=@broadcast, [], @ipv4=@broadcast, [], @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) 11:11:49 executing program 4: 11:11:49 executing program 2: 11:11:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x500, @local}}]}, 0xa0}}, 0x0) 11:11:50 executing program 3: 11:11:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x348, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x138, 0x168, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) 11:11:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x0) 11:11:50 executing program 2: 11:11:50 executing program 4: 11:11:50 executing program 3: 11:11:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x600, @local}}]}, 0xa0}}, 0x0) 11:11:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x348, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x138, 0x168, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) 11:11:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200), 0x0, 0x0) 11:11:50 executing program 2: 11:11:50 executing program 3: 11:11:50 executing program 4: 11:11:50 executing program 3: 11:11:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x700, @local}}]}, 0xa0}}, 0x0) 11:11:50 executing program 3: 11:11:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200), 0x0, 0x0) 11:11:50 executing program 2: 11:11:50 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x42, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000002c0)={0x0, 0x6, 0x4, 0x0, 0x6, {0x0, 0x7530}, {0x0, 0x2, 0x3, 0x5, 0x5, 0x1, "353fb70c"}, 0x0, 0x4, @offset=0x6, 0x986}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000240)={{0x0, 0x0, @descriptor="e625f9dc9720a9b5"}}) socket$unix(0x1, 0x0, 0x0) io_setup(0x0, &(0x7f0000000140)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000080)={0x7ff, 0xffffffff, 0x0, 0x1}, 0x10) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 11:11:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x348, 0x220, 0x220, 0x0, 0x0, 0x220, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0x138, 0x168, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback, @ipv4={[], [], @local}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) 11:11:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x2100, @local}}]}, 0xa0}}, 0x0) 11:11:51 executing program 2: 11:11:51 executing program 3: 11:11:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200), 0x0, 0x0) 11:11:51 executing program 0: 11:11:51 executing program 2: 11:11:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{0x0}], 0x1, 0x0) 11:11:51 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x42, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000002c0)={0x0, 0x6, 0x4, 0x0, 0x6, {0x0, 0x7530}, {0x0, 0x2, 0x3, 0x5, 0x5, 0x1, "353fb70c"}, 0x0, 0x4, @offset=0x6, 0x986}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000240)={{0x0, 0x0, @descriptor="e625f9dc9720a9b5"}}) socket$unix(0x1, 0x0, 0x0) io_setup(0x0, &(0x7f0000000140)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000080)={0x7ff, 0xffffffff, 0x0, 0x1}, 0x10) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 11:11:51 executing program 3: 11:11:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x3f00, @local}}]}, 0xa0}}, 0x0) 11:11:51 executing program 2: 11:11:51 executing program 0: 11:11:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{0x0}], 0x1, 0x0) 11:11:51 executing program 3: 11:11:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x34000, @local}}]}, 0xa0}}, 0x0) 11:11:51 executing program 2: 11:11:51 executing program 0: 11:11:51 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x42, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000002c0)={0x0, 0x6, 0x4, 0x0, 0x6, {0x0, 0x7530}, {0x0, 0x2, 0x3, 0x5, 0x5, 0x1, "353fb70c"}, 0x0, 0x4, @offset=0x6, 0x986}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000240)={{0x0, 0x0, @descriptor="e625f9dc9720a9b5"}}) socket$unix(0x1, 0x0, 0x0) io_setup(0x0, &(0x7f0000000140)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000080)={0x7ff, 0xffffffff, 0x0, 0x1}, 0x10) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 11:11:52 executing program 3: 11:11:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000001200)=[{0x0}], 0x1, 0x0) 11:11:52 executing program 0: 11:11:52 executing program 2: 11:11:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x400300, @local}}]}, 0xa0}}, 0x0) 11:11:52 executing program 3: 11:11:52 executing program 5: 11:11:52 executing program 0: 11:11:52 executing program 4: 11:11:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x1000000, @local}}]}, 0xa0}}, 0x0) 11:11:52 executing program 2: 11:11:52 executing program 5: 11:11:52 executing program 3: 11:11:52 executing program 0: 11:11:52 executing program 4: 11:11:52 executing program 2: 11:11:52 executing program 3: 11:11:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000002c0)='./file1\x00', 0x5e0a000000000004, 0x0, 0x0, 0x0, 0x0) 11:11:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x2000000, @local}}]}, 0xa0}}, 0x0) 11:11:52 executing program 0: 11:11:53 executing program 4: [ 595.112334][T24469] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 11:11:53 executing program 3: 11:11:53 executing program 0: [ 595.177735][T24469] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 11:11:53 executing program 2: 11:11:53 executing program 3: 11:11:53 executing program 0: [ 595.320885][T24469] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 11:11:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x3000000, @local}}]}, 0xa0}}, 0x0) 11:11:53 executing program 4: 11:11:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000002c0)='./file1\x00', 0x5e0a000000000004, 0x0, 0x0, 0x0, 0x0) 11:11:53 executing program 2: 11:11:53 executing program 3: 11:11:53 executing program 0: 11:11:53 executing program 4: 11:11:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x4000000, @local}}]}, 0xa0}}, 0x0) 11:11:53 executing program 2: [ 595.879959][T24500] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 11:11:53 executing program 3: 11:11:53 executing program 4: [ 595.928029][T24500] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 11:11:54 executing program 2: 11:11:54 executing program 0: 11:11:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x5000000, @local}}]}, 0xa0}}, 0x0) [ 596.024584][T24500] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 11:11:54 executing program 0: 11:11:54 executing program 4: 11:11:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000002c0)='./file1\x00', 0x5e0a000000000004, 0x0, 0x0, 0x0, 0x0) 11:11:54 executing program 3: 11:11:54 executing program 2: 11:11:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x6000000, @local}}]}, 0xa0}}, 0x0) 11:11:54 executing program 0: [ 596.552392][T24529] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 11:11:54 executing program 2: 11:11:54 executing program 3: 11:11:54 executing program 4: [ 596.613346][T24529] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 596.678142][T24529] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 11:11:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x7000000, @local}}]}, 0xa0}}, 0x0) 11:11:54 executing program 0: 11:11:54 executing program 5: 11:11:54 executing program 4: 11:11:54 executing program 2: 11:11:54 executing program 3: 11:11:55 executing program 0: 11:11:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x21000000, @local}}]}, 0xa0}}, 0x0) 11:11:55 executing program 5: 11:11:55 executing program 3: 11:11:55 executing program 0: 11:11:55 executing program 2: 11:11:55 executing program 4: 11:11:55 executing program 0: 11:11:55 executing program 4: 11:11:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x3f000000, @local}}]}, 0xa0}}, 0x0) 11:11:55 executing program 5: 11:11:55 executing program 2: 11:11:55 executing program 3: 11:11:55 executing program 0: 11:11:55 executing program 2: 11:11:55 executing program 3: 11:11:55 executing program 4: 11:11:55 executing program 5: 11:11:55 executing program 0: 11:11:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x80ffffff, @local}}]}, 0xa0}}, 0x0) 11:11:55 executing program 2: 11:11:55 executing program 3: 11:11:55 executing program 0: 11:11:56 executing program 5: 11:11:56 executing program 4: 11:11:56 executing program 2: 11:11:56 executing program 5: 11:11:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0xfbffffff, @local}}]}, 0xa0}}, 0x0) 11:11:56 executing program 4: 11:11:56 executing program 3: 11:11:56 executing program 0: 11:11:56 executing program 2: 11:11:56 executing program 5: 11:11:56 executing program 3: 11:11:56 executing program 4: 11:11:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0xffffff7f, @local}}]}, 0xa0}}, 0x0) 11:11:56 executing program 0: 11:11:56 executing program 2: 11:11:56 executing program 5: 11:11:56 executing program 4: 11:11:56 executing program 3: 11:11:56 executing program 0: 11:11:56 executing program 2: 11:11:56 executing program 5: 11:11:56 executing program 3: 11:11:56 executing program 4: 11:11:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0xffffff80, @local}}]}, 0xa0}}, 0x0) 11:11:57 executing program 0: 11:11:57 executing program 5: 11:11:57 executing program 2: 11:11:57 executing program 4: 11:11:57 executing program 3: 11:11:57 executing program 0: 11:11:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0xfffffffb, @local}}]}, 0xa0}}, 0x0) 11:11:57 executing program 5: 11:11:57 executing program 2: 11:11:57 executing program 3: 11:11:57 executing program 4: 11:11:57 executing program 0: 11:11:57 executing program 5: 11:11:57 executing program 2: 11:11:57 executing program 3: 11:11:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x7}}}]}, 0xa0}}, 0x0) 11:11:57 executing program 0: 11:11:57 executing program 4: 11:11:57 executing program 5: 11:11:57 executing program 2: 11:11:57 executing program 3: 11:11:57 executing program 0: 11:11:58 executing program 2: 11:11:58 executing program 4: 11:11:58 executing program 5: 11:11:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:11:58 executing program 3: 11:11:58 executing program 0: 11:11:58 executing program 5: 11:11:58 executing program 2: 11:11:58 executing program 4: 11:11:58 executing program 0: 11:11:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2]}}}]}, 0xa0}}, 0x0) 11:11:58 executing program 3: 11:11:58 executing program 2: 11:11:58 executing program 5: 11:11:58 executing program 4: 11:11:58 executing program 3: 11:11:58 executing program 0: 11:11:58 executing program 5: 11:11:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x3]}}}]}, 0xa0}}, 0x0) 11:11:58 executing program 2: 11:11:58 executing program 4: 11:11:58 executing program 3: 11:11:58 executing program 0: 11:11:58 executing program 5: 11:11:59 executing program 2: 11:11:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x4]}}}]}, 0xa0}}, 0x0) 11:11:59 executing program 4: 11:11:59 executing program 5: 11:11:59 executing program 3: 11:11:59 executing program 0: 11:11:59 executing program 2: 11:11:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x5]}}}]}, 0xa0}}, 0x0) 11:11:59 executing program 4: 11:11:59 executing program 5: 11:11:59 executing program 3: 11:11:59 executing program 0: 11:11:59 executing program 2: 11:11:59 executing program 4: 11:11:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x6]}}}]}, 0xa0}}, 0x0) 11:11:59 executing program 5: 11:11:59 executing program 0: 11:11:59 executing program 3: 11:11:59 executing program 2: 11:11:59 executing program 4: 11:11:59 executing program 5: 11:11:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x7]}}}]}, 0xa0}}, 0x0) 11:11:59 executing program 0: 11:11:59 executing program 3: 11:11:59 executing program 2: 11:12:00 executing program 4: 11:12:00 executing program 5: 11:12:00 executing program 3: 11:12:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x21]}}}]}, 0xa0}}, 0x0) 11:12:00 executing program 0: 11:12:00 executing program 2: 11:12:00 executing program 4: 11:12:00 executing program 5: 11:12:00 executing program 3: 11:12:00 executing program 0: 11:12:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:00 executing program 2: 11:12:00 executing program 4: 11:12:00 executing program 5: 11:12:00 executing program 0: 11:12:00 executing program 2: 11:12:00 executing program 3: 11:12:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:00 executing program 4: 11:12:00 executing program 5: 11:12:00 executing program 0: 11:12:00 executing program 2: 11:12:01 executing program 3: 11:12:01 executing program 4: 11:12:01 executing program 0: 11:12:01 executing program 5: 11:12:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:01 executing program 2: 11:12:01 executing program 3: 11:12:01 executing program 4: 11:12:01 executing program 5: 11:12:01 executing program 0: 11:12:01 executing program 2: 11:12:01 executing program 4: 11:12:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:01 executing program 3: 11:12:01 executing program 5: 11:12:01 executing program 0: 11:12:01 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000200)) 11:12:01 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000028c0)=""/1722, 0x6ba) getdents(r0, &(0x7f0000000180)=""/228, 0xe4) getdents64(r0, 0x0, 0x0) 11:12:01 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 11:12:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:01 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r3, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x8200}]) 11:12:01 executing program 0: 11:12:01 executing program 3: 11:12:02 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) 11:12:02 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c82070, &(0x7f00000001c0)={[{@data_err_ignore='data_err=ignore'}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x400}}]}) 11:12:02 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'pids'}]}, 0x6) 11:12:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, "3431b6d4ebd9bc5b066a598cde04f8b1e907978bca1791ce5968d3b808ca5a9155449afffc970f33225eab59e77a9704a28df3f9350010700fbe1ed4da7db4b6", "2cfc9bb499003bd59175414ae825b9c1fca58f25b9ee26ca667d352769e74a162aec16fd5de2d46bc628d7ffce790d8fd9f58c1d91ade68f9c819fdaf77e2e9b", "5000a9e3224f461bb4d8d8c5844bf6983eaea59f03be2402a206c2b95e5b3bc7", [0x42f3]}) 11:12:02 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 604.228314][T24883] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,inode_readahead_blks=0x0000000000000400, 11:12:02 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000040)='binfmt_misc\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0xffffffffffffffff, r1, 0x0) r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r3) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 11:12:02 executing program 5: perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:12:02 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) [ 604.325380][T24897] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,inode_readahead_blks=0x0000000000000400, 11:12:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:02 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@nodecompose='nodecompose'}]}) 11:12:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xc0}}, 0x0) 11:12:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x40) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080), 0x4) 11:12:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3f6, &(0x7f00000002c0)=[{&(0x7f0000000180)="2e00000032000908d22780258c6394fb0124fc0e10000b500c000200053582c137153e370900018025640200d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x0) 11:12:02 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:02 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x1, &(0x7f0000000140)={&(0x7f0000004540)=""/4096, 0x1000}) 11:12:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, 0x0) [ 604.810991][T24926] hfsplus: unable to find HFS+ superblock 11:12:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x21]}}}]}, 0xa0}}, 0x0) [ 604.896892][T24935] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 604.908211][T24935] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 11:12:03 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) [ 604.974809][T24926] hfsplus: unable to find HFS+ superblock 11:12:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) getdents(r0, &(0x7f0000000300)=""/108, 0x6c) 11:12:03 executing program 2: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000100)=""/82) 11:12:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:03 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_matches\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/100, 0x64}], 0x1, 0x0) 11:12:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) ioctl$USBDEVFS_CONTROL(r0, 0x80045518, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 11:12:03 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:03 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x31, 0x1, 0x0, r0, 0x0}]) 11:12:05 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0x80044324, &(0x7f00000000c0)={0x0, 0x0}) 11:12:05 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c562c067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004fcff", 0xfed1}], 0x1) 11:12:05 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000003c0)={0x18}, 0x18) 11:12:05 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x79c4}) 11:12:06 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)={0x18, r0, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:12:06 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x79c4}) dup2(r0, r1) 11:12:06 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) 11:12:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 11:12:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000140)) 11:12:06 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000400)='/dev/snd/timer\x00', 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000440)='security.ima\x00', &(0x7f0000000480)=@v2, 0x9, 0x0) 11:12:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:06 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:06 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000001280)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044325, &(0x7f00000012c0)) 11:12:06 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5d, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000100)) 11:12:06 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x6, 0x0, 0x0) 11:12:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000580), 0xefee) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x729d0fc}}, 0x50) 11:12:06 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r1) 11:12:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:06 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) utimensat(r0, 0x0, &(0x7f0000000140)={{0x77359400}}, 0x0) 11:12:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x9) 11:12:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x10, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x2}, {0x14}}}, 0x30}}, 0x0) 11:12:07 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x250a00) r2 = socket$netlink(0x10, 0x3, 0x200000000000004) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100)="480000001400f90c09004beafd0d8c56028447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0xacf0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@loopback, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe4) getsockname$packet(r0, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003900)=0x14) r4 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000000)={0x0, @empty, 0x4e22, 0x0, 'lblc\x00'}, 0x2c) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c}]}, 0x3c}}, 0x0) 11:12:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x3, 0x10, "0a6f39d5181b8aa29814dd833fab572ac424cade1ab4ba04fadb74539378c686e8c7aa5b4685ef1c9ea6d4237fbbf48bb77c56c2c50f69060c6e0474cdb11c26", "1489b4dc168fa408820c65ba387538f1ef3661a459f8dc3d98a8d3740ca9d2a6", [0x6, 0x8]}) 11:12:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:07 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) [ 609.158332][T25079] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20002 [ 609.198337][T25079] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 11:12:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000240)={0x13, 0x9, 0xfa00, {&(0x7f0000000040), r1, 0x2}}, 0x18) 11:12:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x9) 11:12:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) [ 609.341223][T25092] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20002 11:12:07 executing program 3: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_CREATE_OPEN(r0, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:07 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x40e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfaec2a30cfef392e, @perf_config_ext, 0x20000040c, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) writev(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd0c, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0}, 0xffffff83) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) 11:12:07 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20ncci\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 11:12:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75bec28eb4f1c8e9cacc607adb22d4d534f4cf29c307700000000000000010000699b0d4300000000000000000000000000000040", "d66ee438c04445ff02d7dd0fa49b88f7a000"}) [ 609.645025][T25118] NFS: Device name not specified 11:12:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:07 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x2, 0x0, &(0x7f0000001980)) 11:12:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:07 executing program 3: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_CREATE_OPEN(r0, &(0x7f00000003c0)={0xa0}, 0xa0) [ 609.671177][T25119] NFS: nfs_mount_data version does not support v3 11:12:07 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 11:12:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 11:12:07 executing program 3: ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_CREATE_OPEN(r0, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:08 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000700)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0x541b, 0x0) 11:12:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) 11:12:08 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x220}, 0x64) 11:12:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:08 executing program 0: r0 = fsopen(&(0x7f0000000100)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) 11:12:08 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000500)=""/121, 0x79) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) 11:12:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:08 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000001980)) 11:12:08 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 11:12:08 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 11:12:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:08 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000001980)) 11:12:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:08 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946ecdf31b1596deb0ca4203cd9022d2123d54f251a679a0178be1f06a5f3b8f874b43f6436989fed14bedd24a984fd3db363cf14ad13f87fbda290a9b6a9364138697dc215f818084c08bbd7a15", 0x266}], 0x1}}], 0x8, 0x0) 11:12:09 executing program 2: timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x0, 0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in=@initdev, @in6=@empty}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000018c0)=0xe8) getegid() getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0x4, 0x0, &(0x7f0000000200)) getpid() clone3(&(0x7f0000003040)={0x2000100, &(0x7f0000002ec0), &(0x7f0000002f00), &(0x7f0000002f40), {}, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000002fc0)}, 0x50) 11:12:09 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000880)) 11:12:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') read$FUSE(r0, &(0x7f0000000140), 0xfffffefa) 11:12:09 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:09 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x401, 0x0) write$capi20_data(r0, &(0x7f00000001c0)={{0x10}, 0xfee, "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"}, 0x1000) 11:12:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000015000)=0x1004, 0x4) listen(r0, 0x0) 11:12:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:09 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x397) setuid(r2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xcd, 0x0, 0x0) 11:12:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:09 executing program 2: mknod(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f00000000c0)={[{@xino_auto='xino=auto'}], [], 0x2c}) 11:12:09 executing program 0: r0 = fanotify_init(0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=')', 0x1}], 0x1) 11:12:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=9F']) 11:12:09 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) [ 611.676679][T25254] overlayfs: missing 'lowerdir' [ 611.689731][T25258] overlayfs: missing 'lowerdir' 11:12:09 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @null, @remote, @default]}, 0x48) 11:12:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:09 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000640)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000080)={0xb}) [ 611.801147][T25265] EXT4-fs: Invalid sb specification: sb=9F,errors=continue 11:12:09 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) [ 611.851757][T25265] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:12:09 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_create1(0x0) write(r1, &(0x7f0000000340), 0x2d8d29c4) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 611.901279][T25276] kcapi: manufacturer command 11 unknown. 11:12:10 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000240)='/dev/loop0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:12:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) [ 612.025835][T25265] EXT4-fs: Invalid sb specification: sb=9F,errors=continue 11:12:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:10 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) [ 612.072526][T25265] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 11:12:10 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000480), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)={0x5, 0x800, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "3652d1c2cf78c41230901c3083bff968c65bf616ae16d3515b088355635e7416bdd571c44d316bf65b4df645d2e6e13e0d90c3098b3db54c25ca641c155f19cd"}}, 0x80}}, 0x0) 11:12:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:10 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7086270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)={[{@prjquota='prjquota'}]}) 11:12:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r0, &(0x7f00000011c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x400}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 11:12:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) [ 612.680962][T25321] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. [ 612.798241][T25321] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. 11:12:10 executing program 0: r0 = io_uring_setup(0x816, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000b80)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 11:12:10 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom, @bcast, @null, @rose, @null]}, 0x48) 11:12:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:10 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:10 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:11 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946ecdf31b1596deb0ca4203cd9022d2123d54f251a679a0178be1f06a5f3b8f874b43f6436989fed14bedd24a984fd3db363cf14ad13f87fbda290a9b6a9364138697dc215f818084c08bbd7a15", 0x266}], 0x1}}], 0x8, 0x0) 11:12:11 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:11 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:11 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:11 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$can_j1939(0x1d, 0x2, 0x7) dup3(r0, r1, 0x0) 11:12:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="05200200000000001c0012000b0001006970766c616e00000c00020006000100020000000a000500340000000000000008000a00", @ANYRES32, @ANYBLOB="af48f4d89260134e795933b9e6e1f600000000000000"], 0x50}}, 0x0) 11:12:11 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:11 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x1b, 0x5b, 0x38, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 11:12:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946ecdf31b1596deb0ca4203cd9022d2123d54f251a679a0178be1f06a5f3b8f874b43f6436989fed14bedd24a984fd3db363cf14ad13f87fbda290a9b6a9364138697dc215f818084c08bbd7a15", 0x266}], 0x1}}], 0x8, 0x0) 11:12:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:11 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) [ 613.612474][T25383] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 11:12:11 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) 11:12:12 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r2}]}}}]}, 0x38}}, 0x0) 11:12:12 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:12 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 11:12:12 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(0xffffffffffffffff, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:12 executing program 0: r0 = getpid() r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) 11:12:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:12 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:12 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(0xffffffffffffffff, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946ecdf31b1596deb0ca4203cd9022d2123d54f251a679a0178be1f06a5f3b8f874b43f6436989fed14bedd24a984fd3db363cf14ad13f87fbda290a9b6a9364138697dc215f818084c08bbd7a15", 0x266}], 0x1}}], 0x8, 0x0) 11:12:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x61000, 0x0) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) 11:12:12 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 11:12:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:12 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self\x00', 0x80042, 0x0) 11:12:12 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(0xffffffffffffffff, r0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:13 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:13 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, 0xffffffffffffffff) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:13 executing program 4: setpriority(0x2, 0x0, 0x9) 11:12:13 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:13 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, 0xffffffffffffffff) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = timerfd_create(0x0, 0x0) r4 = epoll_create(0x400) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r2, &(0x7f0000000000)) 11:12:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:13 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x34}, 0x80, 0x0}, 0x0) 11:12:13 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x1, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x400000005) read(r0, &(0x7f0000001300)=""/5, 0xfff) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "ef9d6776b0523370"}) 11:12:13 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, 0xffffffffffffffff) write$FUSE_CREATE_OPEN(r1, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946ecdf31b1596deb0ca4203cd9022d2123d54f251a679a0178be1f06a5f3b8f874b43f6436989fed14bedd24a984fd3db363cf14ad13f87fbda290a9b6a9364138697dc215f818084c08bbd7a15", 0x266}], 0x1}}], 0x8, 0x0) 11:12:13 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x2000}) 11:12:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:13 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, 0x0) 11:12:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:13 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) dup2(r0, r0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:14 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) r1 = dup(r0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080), 0x4) 11:12:14 executing program 0: unshare(0x20400) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/ip6_flowlabel\x00') preadv(r0, 0x0, 0x0, 0x0) 11:12:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, 0x0) 11:12:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:14 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) dup2(r0, r0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:14 executing program 4: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0445609, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x81, 0x5, 0x0, 0x0, "eb48665c"}, 0x0, 0x0, @userptr}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0xc2542, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 11:12:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, 0x0) 11:12:14 executing program 0: syz_emit_ethernet(0x11, &(0x7f0000000000)={@random="b8d209d47ff3", @dev, @void, {@llc={0x8100, {@llc={0x0, 0x0, 'y'}}}}}, 0x0) 11:12:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', 0x0}) 11:12:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffe59, &(0x7f0000000180)={&(0x7f0000000700)={0x14, r1, 0xd0f, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 11:12:14 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) dup2(r0, r0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000003c0)={0xa0}, 0xa0) 11:12:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:14 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) close(r0) 11:12:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', 0x0}) 11:12:14 executing program 0: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:12:14 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) close(r0) 11:12:14 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, 0x0, 0x0) 11:12:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:15 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', 0x0}) 11:12:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:15 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x24002, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) 11:12:15 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, 0x0, 0x0) 11:12:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:15 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) write$FUSE_CREATE_OPEN(r1, 0x0, 0x0) 11:12:15 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x0, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:15 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0x40045010, &(0x7f0000000040)) ioctl$SOUND_PCM_READ_BITS(r0, 0x40045010, &(0x7f0000000000)) 11:12:15 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000040000000000605be89600200000fe8000000000000000000000000000aaff020000000000000123d8ede181c26147707547000000000000000100020000000000008000c910ff02000000000000000000000000000100000000"], 0x52) 11:12:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:15 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x0, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:15 executing program 3: syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x3ff, 0x0) 11:12:15 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_rxfh={0x0, 0x0, 0x0, 0x0, 0x0, "64a1f3"}}) 11:12:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946ecdf31b1596deb0ca4203cd9022d2123d54f251a679a0178be1f06a5f3b8f874b43f6436989fed14bedd24a984fd3db363cf14ad13f87fbda290a9b6a9364138697dc215f818084c08bbd7a15", 0x266}], 0x1}}], 0x8, 0x0) 11:12:15 executing program 3: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000700)="6ffecad8b1eaf7d9d639e2bcc37cc5594320367209302da08852cf726b4b6ae13d54af907373df1d536b5f32e9f01e72ca9ae65ad6eedc5cca2ec3bfd2ee9b5d7e990c0386fcc368f36808c39ea822cf7864811f5162c663ad4881a6924ead895a6907e0b85f6c20602d3568cf8f70bb8b6fee3218f44ef2fb") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 11:12:15 executing program 0: r0 = socket(0x10, 0x80002, 0x0) close(r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x3c, r1, 0x1, 0x0, 0x0, {0xf}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x3c}}, 0x0) 11:12:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:16 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x200, 0x0) 11:12:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x36, 0x0, &(0x7f0000000080)) 11:12:16 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) 11:12:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@can, 0x15e, &(0x7f0000000480)=[{&(0x7f0000000080)=""/118}, {&(0x7f0000000100)=""/246}, {&(0x7f0000001740)=""/72}, {&(0x7f0000000340)=""/157}, {&(0x7f00000005c0)=""/4096}, {&(0x7f0000000400)=""/123}, {&(0x7f00000015c0)=""/188, 0x55}], 0x0, &(0x7f0000001680)=""/191}}], 0x1c86, 0x2, 0x0) 11:12:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:16 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x18, 0x0, &(0x7f0000000140)=[@increfs={0x40086310}, @request_death={0x400c630e, 0x400c630e}], 0x0, 0x0, 0x0}) 11:12:16 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0104307, &(0x7f0000000080)=0xfffffffe) 11:12:16 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa8100000086dd606f421700142c00fab7f25a2829387e2e186825adf4cc85fe8000000000000000000000000000aa000000008daa6de02f0479ccbfe92a412b1826c051f78f0edd90e16d5f5c9c9208882c8c84af24f2e493047581128b60096986ca52ae4807f3629c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 11:12:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x1265, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ff7968212a8dc641fc247c079cbdbc7e7e05e35d0ee598169784c1d06476cfe6e43093cb3922498c56b98b30c30283703b6a287a47c97f6f1d38c662c1ded063", "cb2f8567c255daf5ec1fcfe622441c9370dc6975afcdf5d330e6be264112fd940954ef6fe77e85ac00f4e8dff716f52a2d591545a8f5679358991d85bee48d8c", "c1d32f56147dbed8ddaeb781375542baa867f305cc64c5a582cf3641cff228d2"}) 11:12:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0x4}) dup2(r0, r2) 11:12:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="ef14406d838e52d55142e76d1cf667aef13f75ac832da928538a4f5017ae5a0f2646a4f7053d2fcb650dd64b4966a06f65f98123398397e185152507cfa626aca8dfc07bd0629fad76ee6dea0ab807d1e496a62678", 0x55}, {&(0x7f0000001340)="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", 0x1bb}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1b02b0c25a03059bcecc7a95c25a3987e758044ab4ea6f7ae3f8e8fecf92a1a7511bf746bec66ba00", 0x4d, 0x11, 0x0, 0x0) 11:12:16 executing program 2: sched_getaffinity(0x0, 0x8, &(0x7f00000001c0)) 11:12:17 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xa) 11:12:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946ecdf31b1596deb0ca4203cd9022d2123d54f251a679a0178be1f06a5f3b8f874b43f6436989fed14bedd24a984fd3db363cf14ad13f87fbda290a9b6a9364138697dc215f818084c08bbd7a15", 0x266}], 0x1}}], 0x8, 0x0) 11:12:17 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000140)={0xf0f002, 0x0, @value}) 11:12:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="ef14406d838e52d55142e76d1cf667aef13f75ac832da928538a4f5017ae5a0f2646a4f7053d2fcb650dd64b4966a06f65f98123398397e185152507cfa626aca8dfc07bd0629fad76ee6dea0ab807d1e496a62678", 0x55}, {&(0x7f0000001340)="682faedcb50b697c164d38e215fbe4aeeaa9f9924ab7aec50856912de401faf856086bbf9fab2132331748bf17c030c16128303ad964542e2d3b2a30fba6db55bdb66f9abf58b85cbcc671729959d81d26322432e66cd7344c9288b24b14973270ef6d9829bc1f1689155cda9dbff68b61cedebbfcfcaf6ee4f695f797d43fb9ca0e97742197c85f8a9e3febe62875e63dc3586fea82555eaf66e87c85c869c3920fb3e6375f36ffba68c0bb83186316414f90408e62786ebed94c66fa795c57511036a9775665573c1ee1f54fa55fbcf475315b3b7d5c88e2a98e1532238b67bf2719da066377e9e322271e038ea0450c6134840900f2c1bad53b4cfdc0b22fc3892e4ed50ee07efb608cab8458fb06d46e553590ca7fdcb2dda69d296b1c48e896526c8597c227fd1b945a98e604d80cb11ffcbb5a23fd1fa2bb109f4feab70d710f79974095ee2127a56361703a6c9c4b2d6089e54d27accbc70d38d6baca0080f3d08c8217f3046cda4a111ffdfe1c7a39c41f731a83650b15cd8b94edb65d4fbe86f413d19f8325631985e9a991fbb27bb46b8846b99eff4ac2189050c8708c136f1e44927ca4535eeebab494cfd1685bfd4cd7ce9bf93b8b", 0x1bb}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1b02b0c25a03059bcecc7a95c25a3987e758044ab4ea6f7ae3f8e8fecf92a1a7511bf746bec66ba00", 0x4d, 0x11, 0x0, 0x0) 11:12:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:17 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000035000505d25a80648c63940d0324fc60100010400a000000053582c137153e37091c018000f01705d1bd", 0x33fe0}], 0x1}, 0x0) 11:12:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, 0x0, &(0x7f0000003800)) [ 619.544966][T25746] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684277 /dev/loop3 scanned by syz-executor.3 (25746) 11:12:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) [ 619.679584][T25753] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 619.687698][T25753] netlink: 11262 bytes leftover after parsing attributes in process `syz-executor.0'. 11:12:17 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000140)={0x0, 0x0, 0x69c4}) r1 = dup2(r0, r0) read$dsp(r1, 0x0, 0xc3) 11:12:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:17 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK/file0\x00'}, 0x6e) 11:12:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') flock(r0, 0xc) 11:12:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0xfffa, 0x0, 0x0, 0x0, 0x0, "3b41905f9f3e5f0b"}) 11:12:18 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000001800)='/proc/slabinfo\x00', 0x0, 0x0) 11:12:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:18 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000280)) 11:12:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:19 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:19 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38}, [{}], "9d8ab26a15e032a14b0b58e087f4b54f2c6300b77dbfc68ceb251731bbf1630fdbdf609f501386a25cad0483417af41508", [[]]}, 0x189) 11:12:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:19 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x7, 0xf}) 11:12:19 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38}, [{}], "9d8ab26a15e032a14b0b58e087f4b54f2c6300b77dbfc68ceb251731bbf1630fdbdf609f501386a25cad0483417af41508", [[]]}, 0x189) 11:12:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:19 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:19 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 11:12:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:19 executing program 0: socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sync_file_range(r0, 0x0, 0x0, 0x1) 11:12:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 11:12:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000680)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000)="14885eed546ff69928d88019da678265cb928c68bd832286b357666a2952d944db", 0x21, 0x0, 0x0, 0x0) 11:12:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x266}], 0x1}}], 0x8, 0x0) 11:12:19 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 11:12:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:20 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000), &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 11:12:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) 11:12:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x119) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000140)="3a615a21f47261228296fc4f46a4180ed26422207c353ede936f3fe41b9f1f8a74d0d5b6b06535156fdf6449b8ad082fc5f921df34bd4f36c28449805e6f3bcf2f87796c86b8e4e72c03b8a19fceda698766", 0x52}, {&(0x7f00000001c0)="fe196ec177a188e7921a2b95b2b9bc1e25edcd00570f26d61ba6dca954276ffaad47d2d2a5a2b8fe249ced0f796bc6f3319d1300523c9f63259b24f7b28be12a35c3de178093f35970ba8da630fda356f8c751cfc5764d2d9bdf3e3db0b13029b677d6bafc5ce99d2bebbe77916bba438c3c4ee319cda593e1dc0c8452c89afae10eff9a7973982c2b77fc0e91670622275331aaf713a375e7eeafb5844936778f1c488ada11e1d4ef5866cb33c71a2f46f0", 0xb2}, {&(0x7f0000000380)="48a058274cb90795bd0e8caade457de99dd4f57836e503d91a2550fd0fb7fdd1b717b3edf6daae7a054ee1a0c1d5955b74f4371763869d0e7ce7ba9d37f1f22bc532e406b468a89c8d83221bfc1c0689650448a9b13315a0a4bec5307aecd0c01487f4fa5c999619917532e01c63091930cafd8cff47eaa400b4c29d111168d0de16fdce7ea9142190856de8ad51336cc27d0dbfb8641e69a705612db7139173f75795e3c3058841868a004cd81f3082594f3b83723d2a7513129ba0b8911cc602a8d9aeee11345a88", 0x19a}, {&(0x7f00000000c0)="7cd24846", 0x4}, {&(0x7f0000000280)="f2de9546a133bfe4f76f1aed55e5f2523c7949d441a9477439004e86ac8fd74e1f6f309f7e9cbf231058826d4effdda54a53", 0x71}, {&(0x7f0000000680)="038efddcd12f43593e6b0fe309b7a2f1156ee33e38", 0x15}, {&(0x7f0000000600)="aac963dcdd1b583a5cdb8e97e23bb214c8260d5f5815a5886dc0ee594f07c01d89c6ca30843aedc25b0cb0641ac8ad13632577f258efca03bd81f6843d7eb203d9aca961b8839837c020f4040e0e5c10a430261385d06a6b", 0x58}, {&(0x7f0000001600)="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", 0xc78}], 0x8) sendfile(r0, r1, &(0x7f0000d83ff8), 0x40008000ffffdffe) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) 11:12:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) [ 622.301492][T10873] hid-generic 0000:0000:0004.0001: item fetching failed at offset 0/1 [ 622.322891][T10873] hid-generic: probe of 0000:0000:0004.0001 failed with error -22 11:12:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) [ 622.383244][ T5] hid-generic 0000:0000:0004.0002: item fetching failed at offset 0/1 11:12:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) [ 622.439278][ T5] hid-generic: probe of 0000:0000:0004.0002 failed with error -22 11:12:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:20 executing program 0: pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 11:12:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180), 0x0, 0x0) 11:12:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:21 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000), &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 11:12:21 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000280)={{0x1, 0x0, r1}}) 11:12:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180), 0x0, 0x0) 11:12:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe, 0x10000}], 0x0, 0x0) 11:12:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180), 0x0, 0x0) 11:12:21 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:21 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0x80044323, &(0x7f0000000040)) 11:12:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:12:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 11:12:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000ef2d30ed9e9ae396fcc43020ed7dbc3b7c3fd06c3aed8a89b7085bd01433b0359c71aad05c6d0fe8111ce33e7e87078ba2050964142a196431429b00c81a7a2ced6159b8161"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100008700632177fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 11:12:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 11:12:22 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:22 executing program 0: semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f00000000c0)=""/135) 11:12:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:12:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:22 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:22 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="f0ca9a00008927b18901"], 0xa) close(r2) socket(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000100)="1608cbc458631fe5e81d7f934619bb33e1b080151adb64fad34e6cfbb010675d35a6de9396a194cb000f17971377858c14ab983f7e4c98ef7a1f078d8592ea8a96b9766bc39cd179", 0x48}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 11:12:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:12:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 11:12:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000ef2d30ed9e9ae396fcc43020ed7dbc3b7c3fd06c3aed8a89b7085bd01433b0359c71aad05c6d0fe8111ce33e7e87078ba2050964142a196431429b00c81a7a2ced6159b8161"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100008700632177fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 11:12:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 11:12:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)}}], 0x1, 0x0) 11:12:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/271, 0x10f}], 0x1, 0x0) 11:12:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:22 executing program 4: syz_open_procfs(0x0, &(0x7f00000016c0)='smaps_rollup\x00') 11:12:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)}}], 0x1, 0x0) 11:12:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 11:12:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:23 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @broadcast}}) 11:12:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)}}], 0x1, 0x0) 11:12:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}]}, 0x38}}, 0x0) 11:12:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 11:12:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{0x0}], 0x1}}], 0x1, 0x0) 11:12:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:23 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @broadcast}}) 11:12:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r0, &(0x7f0000002600)=[{&(0x7f0000002700)=""/120, 0x78}], 0x1, 0x0) 11:12:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 11:12:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:23 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 11:12:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{0x0}], 0x1}}], 0x1, 0x0) 11:12:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 11:12:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{0x0}], 0x1}}], 0x1, 0x0) 11:12:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:24 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 11:12:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 11:12:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='auxv\x00') read$eventfd(r0, 0x0, 0x0) 11:12:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:24 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x807c6406, &(0x7f0000000040)=""/85) 11:12:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)}], 0x1}}], 0x1, 0x0) 11:12:24 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x500) 11:12:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 11:12:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4}, {}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:12:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)}], 0x1}}], 0x1, 0x0) 11:12:24 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)=0x3698045b) 11:12:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000380)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) 11:12:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400), 0x0, 0x10000}], 0x0, 0x0) 11:12:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)}], 0x1}}], 0x1, 0x0) 11:12:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) write(r1, 0x0, 0x0) close(r0) 11:12:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:25 executing program 0: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5]\x00\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x4) lseek(r0, 0x0, 0x1) 11:12:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400), 0x0, 0x10000}], 0x0, 0x0) 11:12:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea", 0x133}], 0x1}}], 0x1, 0x0) 11:12:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:25 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28841) ioctl$USBDEVFS_CONTROL(r0, 0x5523, 0x0) 11:12:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x133}], 0x1}}], 0x1, 0x0) 11:12:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400), 0x0, 0x10000}], 0x0, 0x0) 11:12:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 11:12:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='s'], 0x1) 11:12:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x133}], 0x1}}], 0x1, 0x0) 11:12:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3", 0x5f, 0x10000}], 0x0, 0x0) 11:12:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x1cd}], 0x1}}], 0x1, 0x0) 11:12:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:26 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffffffffffffff18, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c00071bab0925000900070007ab08000c000000f0007e93210001c000000000000000000000000000039915fa2c1ec28670e9889bb94b46fe0000000a0002", 0xffffffffffffff19) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 11:12:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) 11:12:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3", 0x5f, 0x10000}], 0x0, 0x0) [ 628.337286][T26286] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. [ 628.367172][T26286] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. 11:12:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x1cd}], 0x1}}], 0x1, 0x0) 11:12:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2401, 0x0) socket$inet6(0xa, 0x802, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:12:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450", 0x1cd}], 0x1}}], 0x1, 0x0) 11:12:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3", 0x5f, 0x10000}], 0x0, 0x0) 11:12:26 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x2, 0x800000000000004, 0x400000, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], r3}, 0x36) 11:12:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x21a}], 0x1}}], 0x1, 0x0) 11:12:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES64, @ANYRESDEC, @ANYBLOB], 0x5}, 0x1, 0x8000a0ffffffff, 0x0, 0x4048004}, 0x0) r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc008551c, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000740)={0x4, 0x4, [0x0]}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) 11:12:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:27 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x2, 0x800000000000004, 0x400000, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], r3}, 0x36) 11:12:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca90", 0x8f, 0x10000}], 0x0, 0x0) 11:12:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x21a}], 0x1}}], 0x1, 0x0) 11:12:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:27 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) io_submit(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYRESDEC=r3]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x6, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r5, &(0x7f0000000340)=ANY=[], 0xff0e) close(r5) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x0, 0x8}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946e", 0x21a}], 0x1}}], 0x1, 0x0) 11:12:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca90", 0x8f, 0x10000}], 0x0, 0x0) 11:12:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:27 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, 0x0, 0x0) capget(&(0x7f0000000000), 0x0) r1 = getpgid(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) fcntl$getownex(r3, 0x10, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x4}}, 0x20) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="02000000000104000010005749f3e543da9dfd340985cf7734f859b9661225185c909d76e637"], 0xb}}, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) waitid(0x2, 0x0, &(0x7f0000000900), 0x0, &(0x7f0000000480)) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r5 = syz_open_dev$sg(0x0, 0x0, 0x0) writev(r5, &(0x7f0000000000), 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r2, 0x0, 0x5, &(0x7f00000000c0)='syz1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$setpipe(r6, 0x407, 0xfffffffffffffffe) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r7 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) socket$inet_tcp(0x2, 0x1, 0x0) r8 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r8, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) sendfile(r6, r7, 0x0, 0x102000004) 11:12:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x240}], 0x1}}], 0x1, 0x0) 11:12:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca90", 0x8f, 0x10000}], 0x0, 0x0) 11:12:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x240}], 0x1}}], 0x1, 0x0) 11:12:28 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351d", 0x1c0) sendfile(r0, r1, 0x0, 0x7fffffa7) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x2) 11:12:28 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) io_submit(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYRESDEC=r3]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x6, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r5, &(0x7f0000000340)=ANY=[], 0xff0e) close(r5) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x0, 0x8}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x240}], 0x1}}], 0x1, 0x0) 11:12:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) [ 630.315793][ T26] audit: type=1800 audit(1582024348.322:91): pid=26410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16801 res=0 11:12:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x253}], 0x1}}], 0x1, 0x0) 11:12:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a9", 0xa7, 0x10000}], 0x0, 0x0) 11:12:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) [ 630.410902][ T26] audit: type=1804 audit(1582024348.372:92): pid=26410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir431402223/syzkaller.glrmP4/895/file0" dev="sda1" ino=16801 res=1 11:12:28 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, 0x0, 0x0) capget(&(0x7f0000000000), 0x0) r1 = getpgid(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) fcntl$getownex(r3, 0x10, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x4}}, 0x20) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="02000000000104000010005749f3e543da9dfd340985cf7734f859b9661225185c909d76e637"], 0xb}}, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) waitid(0x2, 0x0, &(0x7f0000000900), 0x20000000, &(0x7f0000000480)) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x9a0efa2b65aacb27) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r5 = syz_open_dev$sg(0x0, 0x0, 0x0) writev(r5, &(0x7f0000000000), 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r2, 0x0, 0x5, &(0x7f00000000c0)='syz1\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$setpipe(r6, 0x407, 0xfffffffffffffffe) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r7 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r8 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r8, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r6, r7, 0x0, 0x102000004) 11:12:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x253}], 0x1}}], 0x1, 0x0) 11:12:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a9", 0xa7, 0x10000}], 0x0, 0x0) 11:12:29 executing program 4: r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f", 0x9a) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) 11:12:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x253}], 0x1}}], 0x1, 0x0) 11:12:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000000140)=""/90, 0x5a}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) 11:12:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a9", 0xa7, 0x10000}], 0x0, 0x0) 11:12:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="5c29c056e48e9ee9d765bdc1837c146158b8e82abf70a50c534a2c33d929a4716df70c213930be2075d031eb30098f9e0cd395e73149f16aea0a64be07853b7d1f00e07284212941719b31b77238a1d94a4dc09da71d5af7fcfe58e0e5284abded03744a12d614e98e0cd8da24808ca3c77d39afea7f3d5e35fa895078d25bf2d477623b02472abc3489c8064a430055288ccb6a52527d2a805f15c1b4dcdb667b1a2aa0d2cfd70e6971b7ea269d82e58b1cc79a400dce3f8f93f65d345b3c188f77865b43fe985b80d20ae0f68191faefb3c5e5d035e26b5d4705f69022013b8751ca21aa2b2a12639ba2ffd5f69e9f512c3b08f6eb138a3529afcab0a4695731ceed237f068276cd754f728f89a84796efc265da82feb9de13715d186c84f156b7cfb295b2cd45c9de3cef324f755cf90aea92370f97691e1ba7e1976ead95f5a5a7e2a692ceac8b408bc254cf235aff35d8ec761a8126727d9b25698871ae3d5f511a2def31af0a03565a1fcbc6ea7840c5c38852bcf79084ae7fdfa21dd7355c2c1f9c61fa5797773cc47a139211fc87f47377289f56ca564bdeee1480b6d7d5b6a01c22884467831f2239e2a6b50639d7340a101401e6be220e75cc338d7b07fe63755e3d96bdd4634450b3cd01324c694f4d80f2deb9b7a803d1cdded1e945a60f654f1a017058fe299b9a3d0edebf8819a0d4307ae309ce1935936d9b2fc9c507bb751513c71992fe3da53e2e28a32a2c8f2afea3946ecdf31b1596deb0ca4203cd9022d2123d54f251a679a0178be1f06a5f3b8f874b43f6436989fed14bedd24a984fd3db363cf14ad13f87fbda290a9b6a9364138697dc21", 0x25d}], 0x1}}], 0x1, 0x0) 11:12:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51", 0xb3, 0x10000}], 0x0, 0x0) 11:12:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_MLD_VERSION={0x5}]}}}]}, 0x3c}}, 0x0) socket(0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000005c0), 0xc, 0x0}, 0x0) 11:12:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000000140)=""/90, 0x5a}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) 11:12:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x25d}], 0x1}}], 0x1, 0x0) 11:12:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51", 0xb3, 0x10000}], 0x0, 0x0) 11:12:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x25d}], 0x1}}], 0x1, 0x0) 11:12:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000000140)=""/90, 0x5a}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) 11:12:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:30 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000700)=[0x0, 0x0]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYBLOB]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) creat(0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x28ef3037c3f0dc97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x0, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) splice(r4, 0x0, r5, 0x0, 0x100000000, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x262}], 0x1}}], 0x1, 0x0) 11:12:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51", 0xb3, 0x10000}], 0x0, 0x0) 11:12:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:30 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) io_submit(0x0, 0x2000000000000021, &(0x7f0000000700)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfffffd79}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB='upperdir=./file0,index=on,metacopy=off,lowerdir=./file0,xino=off,nfs_export=off,nfs_export=on,index=on,obj_role=nfs_export=off,smackfshat=/dev/kvm\x00,defcontext=system_u,fowner=', @ANYRESDEC=r3, @ANYBLOB="2c61707072616973652c00f1a70111a8eb5e51f608a99261c8ca162b4fbb7101f3ae4ee768c894062e961270d1404807000000000000005f0f2749024ad0cb56"]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) creat(0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x28ef3037c3f0dc97, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x6, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r5, &(0x7f0000000340)=ANY=[], 0xff0e) close(r5) connect$inet6(r5, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4aa0f71c22ff00", "a9016007", "f6885a10e7196cef"}, 0x28) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x0, 0x8}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a2", 0xb9, 0x10000}], 0x0, 0x0) 11:12:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x262}], 0x1}}], 0x1, 0x0) 11:12:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:30 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000700)=[0x0, 0x0]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYBLOB]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) creat(0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x28ef3037c3f0dc97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x0, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) splice(r4, 0x0, r5, 0x0, 0x100000000, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:30 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) io_submit(0x0, 0x2000000000000021, &(0x7f0000000700)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfffffd79}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB='upperdir=./file0,index=on,metacopy=off,lowerdir=./file0,xino=off,nfs_export=off,nfs_export=on,index=on,obj_role=nfs_export=off,smackfshat=/dev/kvm\x00,defcontext=system_u,fowner=', @ANYRESDEC=r3, @ANYBLOB="2c61707072616973652c00f1a70111a8eb5e51f608a99261c8ca162b4fbb7101f3ae4ee768c894062e961270d1404807000000000000005f0f2749024ad0cb56"]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) creat(0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x28ef3037c3f0dc97, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x6, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r5, &(0x7f0000000340)=ANY=[], 0xff0e) close(r5) connect$inet6(r5, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000400)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4aa0f71c22ff00", "a9016007", "f6885a10e7196cef"}, 0x28) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x0, 0x8}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x262}], 0x1}}], 0x1, 0x0) 11:12:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a2", 0xb9, 0x10000}], 0x0, 0x0) 11:12:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x264}], 0x1}}], 0x1, 0x0) 11:12:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a2", 0xb9, 0x10000}], 0x0, 0x0) 11:12:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x264}], 0x1}}], 0x1, 0x0) 11:12:31 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000700)=[0x0, 0x0]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYRESDEC, @ANYBLOB]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) creat(0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x28ef3037c3f0dc97, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x0, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r5, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) splice(r4, 0x0, r5, 0x0, 0x100000000, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:31 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) io_submit(0x0, 0x2000000000000021, &(0x7f0000000700)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfffffd79}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB='upperdir=./file0,index=on,metacopy=off,lowerdir=./file0,xino=off,nfs_export=off,nfs_export=on,index=on,obj_role=nfs_export=off,smackfshat=/dev/kvm\x00,defcontext=system_u,fowner=', @ANYRESDEC=r3, @ANYBLOB="2c61707072616973652c00f1a70111a8eb5e51f608a99261c8ca162b4fbb7101f3ae4ee768c894062e961270d1404807000000000000005f0f2749024ad0cb56"]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) creat(0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x28ef3037c3f0dc97, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x6, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r6, &(0x7f0000000340)=ANY=[], 0xff0e) close(r6) splice(r5, 0x0, r6, 0x0, 0x100000000, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x0, 0x8}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r7 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b662", 0xbc, 0x10000}], 0x0, 0x0) 11:12:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x264}], 0x1}}], 0x1, 0x0) 11:12:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) 11:12:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b662", 0xbc, 0x10000}], 0x0, 0x0) 11:12:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x265}], 0x1}}], 0x1, 0x0) 11:12:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x265}], 0x1}}], 0x1, 0x0) 11:12:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b662", 0xbc, 0x10000}], 0x0, 0x0) 11:12:32 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) io_submit(0x0, 0x2000000000000021, &(0x7f0000000700)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfffffd79}, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xfe80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB='upperdir=./file0,index=on,metacopy=off,lowerdir=./file0,xino=off,nfs_export=off,nfs_export=on,index=on,obj_role=nfs_export=off,smackfshat=/dev/kvm\x00,defcontext=system_u,fowner=', @ANYRESDEC=r3, @ANYBLOB="2c61707072616973652c00f1a70111a8eb5e51f608a99261c8ca162b4fbb7101f3ae4ee768c894062e961270d1404807000000000000005f0f2749024ad0cb56"]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) pipe(0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) creat(0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x4004005) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "a6cddeb02f407e24b899d9619a4e0a53e1c62827604c39fdaa27e21bee8a0ddd", 0x28ef3037c3f0dc97, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x4}) creat(&(0x7f0000000080)='./file0\x00', 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xa, {0x6, 0x2, 0x40}}, 0xa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r6, &(0x7f0000000340)=ANY=[], 0xff0e) close(r6) splice(r5, 0x0, r6, 0x0, 0x100000000, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x0, 0x8}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf595, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) r7 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 11:12:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f00000002c0), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x2, 0x0, @tick, {}, {}, @quote}], 0xff33) r2 = socket$netlink(0x10, 0x3, 0x15) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000007c0)={0x14, r3, 0xffff}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="30e7284461c39b5a9f72b345ba825e3cf3b6c9399a687405d1aca778650acf19d14f534bf61ba14c60d1b0a83deff3465b0e23fa69cb7257279b687e07dd4660f11f550248dec922ac66b99be18af224a7bda269ab1b805212091fe676a6f3e8b28611162b9dde33638d5a4494dda5fb6284e7", @ANYRES16=r3, @ANYBLOB="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"], 0x128}, 0x1, 0x0, 0x0, 0x24008048}, 0xc800) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x1, 0x3, 0x73, 0x1, 0x0, 0x6, 0x5442c, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4911, 0x2, @perf_config_ext={0x8, 0x2}, 0xe1414a393baae8cf, 0xffff, 0x8, 0x0, 0x1, 0x1, 0x7f}, 0x0, 0x9, r0, 0x0) syz_open_dev$sg(&(0x7f0000000380)='/dev/sg#\x00', 0x2e80, 0x343802) clock_gettime(0x0, &(0x7f0000000200)) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000080)='vcan0\x00'}) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') 11:12:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620f", 0xbd, 0x10000}], 0x0, 0x0) 11:12:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000009180)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000009c0)="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", 0x265}], 0x1}}], 0x1, 0x0) 11:12:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620f", 0xbd, 0x10000}], 0x0, 0x0) 11:12:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) 11:12:33 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0xa0}}, 0x0) 11:12:33 executing program 4: r0 = socket$inet(0x2, 0x5000000000000001, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000a40000)={0x2, {{0x2, 0x0, @rand_addr=0xffffffffedddb9a5}}}, 0x88) 11:12:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620f", 0xbd, 0x10000}], 0x0, 0x0) 11:12:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="2000000014000101000000000000000002080000", @ANYRES32=r2, @ANYBLOB="08000200ac1414bbbcff2885b41d22311941aab7147a16896a0741a3c5f5305e5975a06f85a846af5411bd15d06ff7f83a2c2cc1429050585ef329c6cb59bdc59e4ac83ad14559de6b5c21d39a95d6ab7147a9c2f1d44ecd163f781d7d06333f7fbd35792837cbb8e1a506a62878ab8115673ab13fe7969dede25417c7a70d694a1c63a03fcea0db84100396ad8ef4bef6f6c394d30789b845d42e231f86b26843517026d71c1b5966c8ffcc8fd3fb8ff9e177e5a4be93667256af5fc0a3574c71bd1dee8e18309598caf52abd126bbc415bba7c41491e10b818c485f841c766df2e6bb0c91af024"], 0x20}}, 0x0) [ 635.981104][ T2517] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 636.002863][T26706] hfs: can't find a HFS filesystem on dev loop1 11:12:34 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) [ 636.033691][ T2517] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 636.044991][T26710] hfs: can't find a HFS filesystem on dev loop1 11:12:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, 0x0, 0x0) 11:12:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0xa0}}, 0x0) 11:12:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="0400000000000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000000c0)={[{@nodots='nodots'}]}) 11:12:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="2000000014000101000000000000000002080000", @ANYRES32=r2, @ANYBLOB="08000200ac1414bbbcff2885b41d22311941aab7147a16896a0741a3c5f5305e5975a06f85a846af5411bd15d06ff7f83a2c2cc1429050585ef329c6cb59bdc59e4ac83ad14559de6b5c21d39a95d6ab7147a9c2f1d44ecd163f781d7d06333f7fbd35792837cbb8e1a506a62878ab8115673ab13fe7969dede25417c7a70d694a1c63a03fcea0db84100396ad8ef4bef6f6c394d30789b845d42e231f86b26843517026d71c1b5966c8ffcc8fd3fb8ff9e177e5a4be93667256af5fc0a3574c71bd1dee8e18309598caf52abd126bbc415bba7c41491e10b818c485f841c766df2e6bb0c91af024"], 0x20}}, 0x0) 11:12:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe}], 0x0, 0x0) 11:12:34 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) [ 636.306695][ T2516] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 636.326870][T26719] hfs: can't find a HFS filesystem on dev loop1 11:12:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) [ 636.534824][ T2517] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 636.546405][T26740] hfs: can't find a HFS filesystem on dev loop1 11:12:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0xa0}}, 0x0) 11:12:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/msg\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 11:12:34 executing program 5: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="0400000000000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000000c0)={[{@nodots='nodots'}]}) 11:12:34 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe}], 0x0, 0x0) 11:12:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, 0x0, 0x0) 11:12:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0xa0}}, 0x0) 11:12:35 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) [ 637.019372][ T2517] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 637.030867][T26768] hfs: can't find a HFS filesystem on dev loop1 11:12:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) 11:12:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a669a53f2fe9eb4eb7918628af41b2d5fd98372e7c2a6970f55044163dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fdedeb0ed51ed1df6a248a267b6620fff", 0xbe}], 0x0, 0x0) 11:12:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, 0x0, 0x0) 11:12:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0xa0}}, 0x0) [ 637.311556][ T2517] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 637.322629][T26780] hfs: can't find a HFS filesystem on dev loop1 11:12:35 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) [ 637.553162][ T2517] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 637.565540][T26795] hfs: can't find a HFS filesystem on dev loop1 11:12:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/msg\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 11:12:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}}]}, 0xa0}}, 0x0) 11:12:35 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100736974001400028008000300", @ANYRES32, @ANYBLOB="0600040004000000"], 0x40}}, 0x0) 11:12:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) [ 637.843084][T26809] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 637.854382][ T2517] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 637.866783][T26810] hfs: can't find a HFS filesystem on dev loop1 [ 637.904326][T26816] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:12:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_DOWNDELAY={0x8}, @IFLA_BOND_MIIMON={0x8, 0x3, 0x3}]}}}]}, 0x44}}, 0x0) 11:12:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}}}]}, 0xa0}}, 0x0) 11:12:36 executing program 0: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:36 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x5f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, 0x0, 0x40808) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=ANY=[]}, 0x1, 0x0, 0x0, 0x4}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000000)={0x0, 'bond0\x00', {0x3}, 0x4}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000400)}, 0x8001) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000740)=[@in={0x2, 0x0, @broadcast}, @in6={0xa, 0x0, 0x0, @rand_addr="c0df34b192141832f4ec568e623ad435", 0x1000}, @in6={0xa, 0x0, 0xfffffffd, @mcast1, 0x8}, @in6={0xa, 0x4e21, 0x5, @mcast1, 0xfffffff8}, @in={0x2, 0x4e20}], 0x74) mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r3 = creat(&(0x7f0000000980)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r4 = open(0x0, 0x0, 0x0) write(r4, 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x8001}, 0x8) write$6lowpan_control(r3, &(0x7f0000000300)='connect aa:aa:aa:aa:aa:10 0', 0x1b) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x3}, 0x2004c084) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') open(&(0x7f00000002c0)='./file1\x00', 0x200, 0x0) 11:12:36 executing program 0: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:36 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020f81001f03fe0504000800080008000400ff7e", 0x24}], 0x1}, 0x0) 11:12:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}}, 0x0) 11:12:36 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="010000000000000018") getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, &(0x7f0000000040)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009375, &(0x7f0000000040)) 11:12:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:36 executing program 0: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:36 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x3, 0x5f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, 0x0, 0x40808) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)=ANY=[]}, 0x1, 0x0, 0x0, 0x4}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000000)={0x0, 'bond0\x00', {0x3}, 0x4}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYRES16, @ANYBLOB="00002cbd7000fcdbdf25010000000c00990003000000ffffffff", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0x7}}, 0x8001) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000740)=[@in={0x2, 0x4e24, @dev}, @in={0x2, 0x0, @broadcast}, @in6={0xa, 0x0, 0x0, @rand_addr="c0df34b192141832f4ec568e623ad435", 0x1000}, @in6={0xa, 0x0, 0xfffffffd, @mcast1, 0x8}, @in6={0xa, 0x4e21, 0x5, @mcast1, 0xfffffff8}, @in={0x2, 0x4e20}], 0x84) mkdir(&(0x7f0000000500)='./file1\x00', 0x0) r3 = creat(&(0x7f0000000980)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r4 = open(0x0, 0x0, 0x0) write(r4, 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="01100000a5d86da8f455975030cc575b45193f54ffbeac68f8094be5a659945a818675de7992ba313e96aa70a6a120bfa361fc5b7c942775fb3855cfb3814f3ed843b90a28212abb3a5c721c0d5be4c9d076e50ef09a0f89a6ce62b706003a277a5680f2d88da9aba6b8db2ddca46a73542344a7517d2a5a7b209c535dd4595c1300"/148, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x8001}, 0x8) write$6lowpan_control(r3, &(0x7f0000000300)='connect aa:aa:aa:aa:aa:10 0', 0x1b) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000700)={&(0x7f0000000240), 0xc, &(0x7f00000006c0)={&(0x7f00000003c0)={0x1c, 0x0, 0x0, 0x70bd2a, 0x0, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x3}, 0x2004c084) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') open(&(0x7f00000002c0)='./file1\x00', 0x200, 0x0) 11:12:36 executing program 5: getpid() r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) [ 638.488006][T26852] autofs4:pid:26852:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(0.0), cmd(0x00009375) [ 638.517075][T26852] autofs4:pid:26852:validate_dev_ioctl: invalid device control module version supplied for cmd(0x00009375) 11:12:36 executing program 0: mknod$loop(0x0, 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x2}}]}, 0xa0}}, 0x0) 11:12:36 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) r3 = socket$inet6(0xa, 0x200000000003, 0x87) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 11:12:36 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="010000000000000018") r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x8000000000009371, &(0x7f0000000040)) 11:12:36 executing program 0: mknod$loop(0x0, 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000002200)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 11:12:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:36 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)) 11:12:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x3}}]}, 0xa0}}, 0x0) 11:12:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$cgroup_int(r3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='oom_score_adj\x00') r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYRESOCT=r5], 0x17) splice(r2, 0x0, r4, 0x0, 0x8100000, 0x0) 11:12:37 executing program 0: mknod$loop(0x0, 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:37 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) 11:12:37 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r1 = socket$inet6(0xa, 0x2000000080803, 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x2, 0x20000000200000, 0xfffffffffffffffa, 0xfd8}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000028c0), 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) bind(r4, &(0x7f0000000440)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x8, 0x80000001, "d154ea9b6a4506f64d31be37cb7078c6bac3c0ed90e9e696bed0d141ca5e9ef3f7c5656500cdd391de7db6d6447f4c5d6e187d5d57b759a1669007a03c5a10"}, 0x80) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) r6 = dup(r5) sendmsg$NL80211_CMD_GET_MPATH(r6, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200026bd7000fbdb56251500000008000300", @ANYRES32=0x0, @ANYBLOB="f3ff0200", @ANYRES32=0x0, @ANYBLOB="089326f31a", @ANYRES32=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x41}, 0x4008001) ioctl$NS_GET_PARENT(r6, 0xb702, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x0) r7 = syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) readv(r7, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x10000000000003c3) 11:12:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x4}}]}, 0xa0}}, 0x0) 11:12:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:37 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:37 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000180)=@md0='/dev/md0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bfs\x00', 0x0, 0x0) 11:12:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x5}}]}, 0xa0}}, 0x0) [ 639.623140][ T2517] blk_update_request: I/O error, dev loop11, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 639.635416][T26925] hfs: can't find a HFS filesystem on dev loop11 11:12:37 executing program 5: 11:12:37 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) [ 639.672020][ T2517] blk_update_request: I/O error, dev loop11, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 639.683244][T26927] hfs: can't find a HFS filesystem on dev loop11 11:12:37 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:37 executing program 3: 11:12:37 executing program 4: 11:12:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:37 executing program 5: 11:12:37 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x6}}]}, 0xa0}}, 0x0) 11:12:38 executing program 4: 11:12:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaaf2000007"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="7400000024000705000000000000000000010000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) 11:12:38 executing program 5: 11:12:38 executing program 4: [ 640.309233][T26971] hfs: can't find a HFS filesystem on dev loop1 11:12:38 executing program 5: 11:12:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x7}}]}, 0xa0}}, 0x0) 11:12:38 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:38 executing program 3: 11:12:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 11:12:38 executing program 4: 11:12:38 executing program 5: [ 640.628827][T26984] hfs: can't find a HFS filesystem on dev loop1 11:12:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x21}}]}, 0xa0}}, 0x0) 11:12:38 executing program 3: 11:12:38 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:38 executing program 4: 11:12:38 executing program 5: 11:12:39 executing program 3: 11:12:39 executing program 4: 11:12:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x300}}]}, 0xa0}}, 0x0) 11:12:39 executing program 5: [ 641.042350][ T2516] print_req_error: 2 callbacks suppressed [ 641.042369][ T2516] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 641.065996][T27006] hfs: can't find a HFS filesystem on dev loop1 11:12:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, 0x0}, 0x0) 11:12:39 executing program 3: 11:12:39 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:39 executing program 4: 11:12:39 executing program 5: 11:12:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x500}}]}, 0xa0}}, 0x0) 11:12:39 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:39 executing program 5: 11:12:39 executing program 3: 11:12:39 executing program 4: 11:12:39 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:39 executing program 5: 11:12:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, 0x0}, 0x0) 11:12:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x600}}]}, 0xa0}}, 0x0) 11:12:39 executing program 3: 11:12:39 executing program 4: 11:12:39 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:39 executing program 5: 11:12:40 executing program 4: 11:12:40 executing program 3: 11:12:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x700}}]}, 0xa0}}, 0x0) 11:12:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:40 executing program 5: 11:12:40 executing program 4: 11:12:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, 0x0}, 0x0) 11:12:40 executing program 3: 11:12:40 executing program 5: 11:12:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) 11:12:40 executing program 4: 11:12:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x2100}}]}, 0xa0}}, 0x0) 11:12:40 executing program 3: 11:12:40 executing program 5: 11:12:40 executing program 4: 11:12:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 11:12:40 executing program 3: 11:12:40 executing program 4: 11:12:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)}, 0x0) 11:12:40 executing program 5: 11:12:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 11:12:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x3f00}}]}, 0xa0}}, 0x0) 11:12:40 executing program 3: 11:12:41 executing program 4: 11:12:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 11:12:41 executing program 5: 11:12:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x34000}}]}, 0xa0}}, 0x0) 11:12:41 executing program 4: 11:12:41 executing program 3: 11:12:41 executing program 5: 11:12:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)}, 0x0) 11:12:41 executing program 0: 11:12:41 executing program 4: 11:12:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x400300}}]}, 0xa0}}, 0x0) 11:12:41 executing program 3: 11:12:41 executing program 5: 11:12:41 executing program 4: 11:12:41 executing program 3: 11:12:41 executing program 0: 11:12:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x1000000}}]}, 0xa0}}, 0x0) 11:12:41 executing program 4: 11:12:41 executing program 5: 11:12:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)}, 0x0) 11:12:42 executing program 3: 11:12:42 executing program 0: 11:12:42 executing program 4: 11:12:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x2000000}}]}, 0xa0}}, 0x0) 11:12:42 executing program 5: 11:12:42 executing program 0: 11:12:42 executing program 3: 11:12:42 executing program 4: 11:12:42 executing program 5: 11:12:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x3000000}}]}, 0xa0}}, 0x0) 11:12:42 executing program 0: 11:12:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 11:12:42 executing program 3: 11:12:42 executing program 4: 11:12:42 executing program 5: 11:12:42 executing program 0: 11:12:42 executing program 4: 11:12:42 executing program 3: 11:12:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x4000000}}]}, 0xa0}}, 0x0) 11:12:42 executing program 4: 11:12:42 executing program 3: 11:12:43 executing program 5: 11:12:43 executing program 0: 11:12:43 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 11:12:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x5000000}}]}, 0xa0}}, 0x0) 11:12:43 executing program 4: 11:12:43 executing program 5: 11:12:43 executing program 3: 11:12:43 executing program 0: 11:12:43 executing program 5: 11:12:43 executing program 3: 11:12:43 executing program 4: 11:12:43 executing program 0: 11:12:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x6000000}}]}, 0xa0}}, 0x0) 11:12:43 executing program 4: 11:12:43 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 11:12:43 executing program 0: 11:12:43 executing program 5: 11:12:43 executing program 3: 11:12:43 executing program 3: 11:12:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x7000000}}]}, 0xa0}}, 0x0) 11:12:43 executing program 4: 11:12:43 executing program 0: 11:12:43 executing program 5: 11:12:44 executing program 4: 11:12:44 executing program 5: 11:12:44 executing program 0: 11:12:44 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 11:12:44 executing program 3: 11:12:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x21000000}}]}, 0xa0}}, 0x0) 11:12:44 executing program 4: 11:12:44 executing program 5: 11:12:44 executing program 0: 11:12:44 executing program 3: 11:12:44 executing program 4: 11:12:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x3f000000}}]}, 0xa0}}, 0x0) 11:12:44 executing program 0: 11:12:44 executing program 5: 11:12:44 executing program 3: 11:12:44 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 11:12:44 executing program 4: 11:12:44 executing program 5: 11:12:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0x80ffffff}}]}, 0xa0}}, 0x0) 11:12:44 executing program 0: 11:12:45 executing program 3: 11:12:45 executing program 4: 11:12:45 executing program 5: 11:12:45 executing program 0: 11:12:45 executing program 3: 11:12:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0xfbffffff}}]}, 0xa0}}, 0x0) 11:12:45 executing program 4: 11:12:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 11:12:45 executing program 5: 11:12:45 executing program 0: 11:12:45 executing program 3: 11:12:45 executing program 5: 11:12:45 executing program 4: 11:12:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0xffffff7f}}]}, 0xa0}}, 0x0) 11:12:45 executing program 0: 11:12:45 executing program 3: 11:12:45 executing program 4: 11:12:45 executing program 5: 11:12:45 executing program 0: 11:12:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0xffffff80}}]}, 0xa0}}, 0x0) 11:12:46 executing program 3: 11:12:46 executing program 5: 11:12:46 executing program 0: 11:12:46 executing program 4: 11:12:46 executing program 2: 11:12:46 executing program 3: 11:12:46 executing program 0: 11:12:46 executing program 2: 11:12:46 executing program 4: 11:12:46 executing program 5: 11:12:46 executing program 3: 11:12:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local, 0xfffffffb}}]}, 0xa0}}, 0x0) 11:12:46 executing program 2: 11:12:46 executing program 4: 11:12:46 executing program 0: 11:12:46 executing program 5: 11:12:46 executing program 3: 11:12:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xf}}, 0x0) 11:12:46 executing program 5: 11:12:46 executing program 4: 11:12:46 executing program 0: 11:12:46 executing program 2: 11:12:46 executing program 3: 11:12:47 executing program 5: 11:12:47 executing program 0: 11:12:47 executing program 4: 11:12:47 executing program 2: 11:12:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xc0}}, 0x0) 11:12:47 executing program 3: 11:12:47 executing program 0: 11:12:47 executing program 4: 11:12:47 executing program 5: 11:12:47 executing program 2: 11:12:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x33fe0}}, 0x0) 11:12:47 executing program 3: 11:12:47 executing program 0: 11:12:47 executing program 5: 11:12:47 executing program 4: 11:12:47 executing program 2: 11:12:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x200000a0}}, 0x0) 11:12:47 executing program 0: 11:12:47 executing program 3: 11:12:47 executing program 5: 11:12:47 executing program 4: 11:12:47 executing program 2: 11:12:47 executing program 0: 11:12:48 executing program 3: 11:12:48 executing program 5: 11:12:48 executing program 4: 11:12:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x7ffff000}}, 0x0) 11:12:48 executing program 2: 11:12:48 executing program 0: 11:12:48 executing program 3: 11:12:48 executing program 5: 11:12:48 executing program 2: 11:12:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xfffffdef}}, 0x0) 11:12:48 executing program 4: 11:12:48 executing program 3: 11:12:48 executing program 0: 11:12:48 executing program 4: 11:12:48 executing program 5: 11:12:48 executing program 2: 11:12:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x2}, 0x0) 11:12:48 executing program 3: 11:12:48 executing program 0: 11:12:48 executing program 4: 11:12:48 executing program 5: 11:12:48 executing program 2: 11:12:48 executing program 4: 11:12:48 executing program 0: 11:12:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x5}, 0x0) 11:12:49 executing program 3: 11:12:49 executing program 5: 11:12:49 executing program 2: 11:12:49 executing program 0: 11:12:49 executing program 4: 11:12:49 executing program 3: 11:12:49 executing program 5: 11:12:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x7}, 0x0) 11:12:49 executing program 2: 11:12:49 executing program 0: 11:12:49 executing program 4: 11:12:49 executing program 3: 11:12:49 executing program 5: 11:12:49 executing program 0: 11:12:49 executing program 2: 11:12:49 executing program 4: 11:12:49 executing program 3: 11:12:49 executing program 2: 11:12:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x8}, 0x0) 11:12:49 executing program 5: 11:12:49 executing program 0: 11:12:49 executing program 4: 11:12:49 executing program 3: 11:12:50 executing program 2: 11:12:50 executing program 5: 11:12:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x9}, 0x0) 11:12:50 executing program 0: 11:12:50 executing program 4: 11:12:50 executing program 3: 11:12:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000005516b7457982e505", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8, 0x16, 0x32}]}}]}, 0x3c}}, 0x0) 11:12:50 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000001600)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x54}}, 0x0) 11:12:50 executing program 0: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 11:12:50 executing program 4: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x2a03, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 11:12:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) readv(0xffffffffffffffff, &(0x7f0000002680)=[{&(0x7f0000000040)=""/108, 0x6c}], 0x1) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) accept4$bt_l2cap(r0, 0x0, &(0x7f0000000000), 0x532920ceae310ed9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 11:12:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0xa}, 0x0) 11:12:50 executing program 5: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x28030000, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) [ 652.532289][T27547] team0: Device ipvlan1 failed to register rx_handler [ 652.672545][T27553] IPVS: ftp: loaded support on port[0] = 21 11:12:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x17}, 0x0) [ 652.840631][T27557] team0: Device ipvlan1 failed to register rx_handler 11:12:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000002680), 0x0) mmap$dsp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2800001, 0x10010, r0, 0x0) creat(0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000140)={0x0, 0xa3}, 0x8) sendto$inet6(r1, &(0x7f0000000180)='Y', 0x1, 0x4000, 0x0, 0x0) close(r1) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) open_by_handle_at(0xffffffffffffffff, &(0x7f00000002c0)={0xd1, 0x0, "9ba83fc291d7538cf475591957dc472deea036314e257679d5ce44b07e311e55d15c2787f16484e588dff8f73b5e216dc1592641a6b2ab15c318037c2f15fa3e902f4d2032af316559569b663eb5de9b13aa507a61bb0a3faec3ae7a8c88c1656fc246b7233ee5ed0369cb364e9d7ac64d67cafcf633f52d6d0099af299a6a31fcb88c07dbc9e9d2e624aeca3b677bf97d4e5a3b7a458719f7f06135b0cab978f9c340592faf7f1287212e528b567c7a6c5ee87d0f49259e312ff4220637f6de79e553e3dda7602dac"}, 0x66b01) [ 653.076730][T27565] IPVS: ftp: loaded support on port[0] = 21 11:12:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x18}, 0x0) 11:12:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) wait4(0x0, 0x0, 0x0, 0x0) [ 653.560540][T27553] IPVS: ftp: loaded support on port[0] = 21 [ 653.635021][T27565] IPVS: ftp: loaded support on port[0] = 21 11:12:51 executing program 0: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 11:12:51 executing program 5: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x28030000, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 11:12:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000002680), 0x0) mmap$dsp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2800001, 0x10010, r0, 0x0) creat(0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000140)={0x0, 0xa3}, 0x8) sendto$inet6(r1, &(0x7f0000000180)='Y', 0x1, 0x4000, 0x0, 0x0) close(r1) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) open_by_handle_at(0xffffffffffffffff, &(0x7f00000002c0)={0xd1, 0x0, "9ba83fc291d7538cf475591957dc472deea036314e257679d5ce44b07e311e55d15c2787f16484e588dff8f73b5e216dc1592641a6b2ab15c318037c2f15fa3e902f4d2032af316559569b663eb5de9b13aa507a61bb0a3faec3ae7a8c88c1656fc246b7233ee5ed0369cb364e9d7ac64d67cafcf633f52d6d0099af299a6a31fcb88c07dbc9e9d2e624aeca3b677bf97d4e5a3b7a458719f7f06135b0cab978f9c340592faf7f1287212e528b567c7a6c5ee87d0f49259e312ff4220637f6de79e553e3dda7602dac"}, 0x66b01) 11:12:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) readv(0xffffffffffffffff, &(0x7f0000002680)=[{&(0x7f0000000040)=""/108, 0x6c}], 0x1) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) accept4$bt_l2cap(r0, 0x0, &(0x7f0000000000), 0x532920ceae310ed9) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 11:12:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1a}, 0x0) 11:12:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 654.170018][T27584] team0: Device ipvlan1 failed to register rx_handler [ 654.208208][ T7] tipc: TX() has been purged, node left! [ 654.236398][T27589] IPVS: ftp: loaded support on port[0] = 21 [ 654.343459][T27591] IPVS: ftp: loaded support on port[0] = 21 11:12:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0x0, 0x0) creat(0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x0, 0xa3}, 0x8) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 11:12:52 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fchownat(0xffffffffffffff9c, &(0x7f0000000380)='./bus/file0\x00', 0x0, 0x0, 0x1000) 11:12:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x57}, 0x0) 11:12:53 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) linkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x1000) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() close(0xffffffffffffffff) fchownat(0xffffffffffffff9c, &(0x7f0000000380)='./bus/file0\x00', 0x0, 0x0, 0x1000) 11:12:53 executing program 0: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) [ 655.169170][T27610] IPVS: ftp: loaded support on port[0] = 21 11:12:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x64}, 0x0) [ 655.338127][T27612] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 655.372288][T27611] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 11:12:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3d) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}}, 0x0) [ 655.467140][T27621] IPVS: ftp: loaded support on port[0] = 21 11:12:53 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fchownat(0xffffffffffffff9c, &(0x7f0000000380)='./bus/file0\x00', 0x0, 0x0, 0x1000) 11:12:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x67}, 0x0) 11:12:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) syz_open_procfs(0x0, 0x0) creat(0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x0, 0xa3}, 0x8) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) [ 655.723795][T27626] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 655.773490][T27626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 655.798962][T27626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 655.919273][T27634] IPVS: ftp: loaded support on port[0] = 21 11:12:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x300}, 0x0) [ 657.088008][ T7] tipc: TX() has been purged, node left! [ 657.268065][ T7] tipc: TX() has been purged, node left! 11:12:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:12:55 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x1b0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:12:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="6d047c005d52994c0afc21be2900000047e2252cb7882b9abb2a2f9fb9399e0400c33f00102b0200000089da006a001499b2d1b3a4952f36def66e54e4c909c01e8c4e61f8a0e814f7e2acdd0063c7caa49d5c0600000000dc10000000000096b96613b586d2307a1c75f954035ac283ff9d10305309658b8e060038e8941f9e1653e46a428657a686295981d565ed8b40b8382c58a17e2ee72ddd8e12402a08de7a022be9d4c732feee4ed546ef9724dfe2d43af9fe5bcd59bf9117673acfa22a2230ad43936500de7c065b8cc0b53b7f78e7505d8e2b53d167eeff070000000000000000ff01e5fb5538d0"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 11:12:55 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a49fd22044869bdc0ff0cafdc092dd3e5f2728dd3738ee9f375d8979e09ca1426274eb04340008dc12de7d12a2d1d991f680b02e12bda5c121bb117443b7e280108d7266a4dd4d0b7e8a84682022113d1500769590a30515a460efd4b03f51f3161691c91d3c5b79ac9da66bc7b62c20c10080c9e461665114763f5126b747f67748382aac217944570c8c51d63511bc45fe5c425ea10a42f3062ab8f6e2457e25aba566243b83052809d9e043b388cf8a6808aafa78db0327b43c59008b4d3b1f18b77a59e9a979966a948a29caf978c1435c44150fd18f3a5eff429f4e06c5a071ab14e08c3e339ac77d671f5e1fe58bb122377d99752703d7e3fcfb84f3ca871fc60a678b0828a636cb425ce93a43b978326c227842b29bcba8d62f744ba9a5c0fdb5daabc9c42d97c584a9e6a252c0cfa3f577c87750133ee4c910a69566f987f2bd38383caa5098f71d713156a6c818c3bd1a331c2fd701270667d1f35a7a", 0x1ac}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:12:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x2}, 0x0) 11:12:55 executing program 0: sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) [ 657.449700][ T7] tipc: TX() has been purged, node left! [ 657.463918][T27648] ptrace attach of "/root/syz-executor.5"[27647] was attempted by "/root/syz-executor.5"[27648] 11:12:55 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)="a7", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1d, r0, 0xffffffffffffffff, r1, 0x0) 11:12:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x50}}, 0x0) [ 657.491091][T27654] ptrace attach of "/root/syz-executor.4"[27653] was attempted by "/root/syz-executor.4"[27654] [ 657.527813][T27655] ptrace attach of "/root/syz-executor.3"[27649] was attempted by "/root/syz-executor.3"[27655] [ 657.628001][ T7] tipc: TX() has been purged, node left! 11:12:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x3}, 0x0) 11:12:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)='2', 0x1}], 0x1) [ 657.778636][ T7] tipc: TX() has been purged, node left! 11:12:55 executing program 4: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:12:55 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffe00}, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) eventfd2(0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xff2e) ftruncate(r1, 0x200004) read(r0, &(0x7f0000000340)=""/123, 0x7b) sendfile(r0, r1, 0x0, 0x80001d00c0d0) [ 657.928003][ T7] tipc: TX() has been purged, node left! [ 658.097994][ T7] tipc: TX() has been purged, node left! [ 660.408079][ T7] tipc: TX() has been purged, node left! 11:12:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:12:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x4}, 0x0) 11:12:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x1ad}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:12:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x400000000000290, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='cgroup\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 11:12:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) remap_file_pages(&(0x7f00001e3000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 11:12:58 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffe00}, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) eventfd2(0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xff2e) ftruncate(r1, 0x200004) read(r0, &(0x7f0000000340)=""/123, 0x7b) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 11:12:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @remote}, {0x0, 0x0, 0x8}}}}, 0x26) [ 660.601045][T27718] ptrace attach of "/root/syz-executor.4"[27717] was attempted by "/root/syz-executor.4"[27718] [ 660.607539][T27721] mmap: syz-executor.5 (27721) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 11:12:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x5}, 0x0) 11:12:58 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x1af}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:12:58 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a49fd22044869bdc0ff0cafdc092dd3e5f2728dd3738ee9f375d8979e09ca1426274eb04340008dc12de7d12a2d1d991f680b02e12bda5c121bb117443b7e280108d7266a4dd4d0b7e8a84682022113d1500769590a30515a460efd4b03f51f3161691c91d3c5b79ac9da66bc7b62c20c10080c9e461665114763f5126b747f67748382aac217944570c8c51d63511bc45fe5c425ea10a42f3062ab8f6e2457e25aba566243b83052809d9e043b388cf8a6808aafa78db0327b43c59008b4d3b1f18b77a59e9a979966a948a29caf978c1435c44150fd18f3a5eff429f4e06c5a071ab14e08c3e339ac77d671f5e1fe58bb122377d99752703d7e3fcfb84f3ca871fc60a678b0828a636cb425ce93a43b978326c227842b29bcba8d62f744ba9a5c0fdb5daabc9c42d97c584a9e6a252c0cfa3f577c87750133ee4c910a69566f987f2bd38383caa5098f71d713156a6c818c3bd1a331c2fd701270667d1f3", 0x1aa}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 660.763151][T27730] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 660.787347][T27730] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 660.798892][T27731] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 660.858035][T27730] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 660.863961][T27738] ptrace attach of "/root/syz-executor.0"[27737] was attempted by "/root/syz-executor.0"[27738] 11:12:58 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000000004, 0x32, 0xffffffffffffffff, 0x0) 11:12:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x24, &(0x7f0000000040)=0x81, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf33c4db0b99b3c73}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f00000002c0)={@void, @val, @mpls={[], @ipv6=@tipc_packet={0x0, 0x6, "d2eacf", 0x28, 0x3a, 0x0, @empty, @mcast2, {[], @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}, 0x5a) [ 660.904436][T27741] ptrace attach of "/root/syz-executor.5"[27740] was attempted by "/root/syz-executor.5"[27741] [ 661.257633][T27748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 661.310215][T27748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 661.378067][T27748] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 661.495905][T27750] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 661.562908][T27750] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 661.590145][T27731] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 661.668199][T27731] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 662.548700][ T0] NOHZ: local_softirq_pending 08 11:13:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x6}, 0x0) 11:13:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x18}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x58}}, 0x0) 11:13:01 executing program 3: getpid() perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') sendfile(r0, r0, 0x0, 0xffff) 11:13:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0x24, &(0x7f0000000040)=0x81, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf33c4db0b99b3c73}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f00000002c0)={@void, @val, @mpls={[], @ipv6=@tipc_packet={0x0, 0x6, "d2eacf", 0x28, 0x3a, 0x0, @empty, @mcast2, {[], @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}, 0x5a) 11:13:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') sendfile(r0, r0, 0x0, 0xffff) [ 663.693418][T27760] syz-executor.3 (27760): /proc/27758/oom_adj is deprecated, please use /proc/27758/oom_score_adj instead. 11:13:01 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0xa, 0x1000000000000, &(0x7f0000000100)=[{&(0x7f0000000040)="e588da94b522c2d1f313702948718f407fe7166ac45a790cd2095b44582f3310fb003cb29f9afc1ddb6272a61982d91403b9914e7638a71eab73d729de3c717034a0069e9ed7d8d5fa1979ad04faed8aeb63cac0ab9a4d2927d53b44ef0f6eb8b357571086780d116f40c92841c5a3d72ac31d7abedde3433aa57b7fefb2a6e25f68b39642e8ed4cba1d481661ba"}, {&(0x7f0000000600)="a175aecfc133f10e8096d588d507cb2369905aafe9156c60719627564d1f5841ed3912a4b4d6372b4d52111e6d26ae638675c823527d292fb9cfb0691358daaeed278a87b98817f0efa445e1e8110e40b7979829311002818ea4bfa43e186dbdf71f761f261789a4e4063b30213fc8674cff946703b49ecc157cd063ec3bf08b8f75365561ef81b12e6d77479cb6fba9e4a0e862fe0729da03403caa9b02aff1a185885195"}], 0xe, &(0x7f0000000100)}], 0x126618d46e7cf97, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x84080, 0x0) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000280)) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x30, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6032}, [@IFLA_CARRIER_CHANGES={0x8, 0x23, 0x1}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x30}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x88, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6032}, [@IFLA_LINKINFO={0x60, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x50, 0x2, 0x0, 0x1, [@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e22}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x23}}}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xfff8}]}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x88}}, 0x0) 11:13:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') sendfile(r0, r0, 0x0, 0xffff) [ 663.757860][T27765] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 663.818474][T27765] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 11:13:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x7}, 0x0) 11:13:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x18}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x58}}, 0x0) 11:13:02 executing program 4: r0 = socket(0x18, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) dup2(r0, r1) 11:13:02 executing program 3: open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0xdde25c20b8936826, 0x0) flock(r0, 0x6) 11:13:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:04 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a49fd22044869bdc0ff0cafdc092dd3e5f2728dd3738ee9f375d8979e09ca1426274eb04340008dc12de7d12a2d1d991f680b02e12bda5c121bb117443b7e280108d7266a4dd4d0b7e8a84682022113d1500769590a30515a460efd4b03f51f3161691c9", 0xaf}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x21}, 0x0) 11:13:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0xa, 0x801, 0x6) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) semget$private(0x0, 0x3, 0x80) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 11:13:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, 0x0) 11:13:04 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) epoll_create1(0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009000)={0x3ff, 0x23}) socket$inet_sctp(0x2, 0x800000000000001, 0x84) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 11:13:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{0x0, 0x9, 0x0, [], 0xff}]}}) 11:13:04 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) epoll_create1(0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000009000)={0x3ff, 0x23}) socket$inet_sctp(0x2, 0x800000000000001, 0x84) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 666.812037][T27811] ptrace attach of "/root/syz-executor.0"[27810] was attempted by "/root/syz-executor.0"[27811] 11:13:04 executing program 4: getpid() getpid() socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x1f}, &(0x7f0000000140)=0x8) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2810, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$bsg(0xffffffffffffff9c, &(0x7f0000000340)='/dev/bsg\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') sendfile(r0, r0, 0x0, 0xffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffff) 11:13:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x300}, 0x0) 11:13:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{0x0, 0x1, 0x0, [], 0xff}]}}) 11:13:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x1e, 0xeb, 0xfc}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(0xffffffffffffffff, 0x80044dfb, 0x0) 11:13:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) inotify_init1(0x0) poll(&(0x7f0000000100)=[{}], 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) inotify_init1(0x0) poll(&(0x7f0000000100)=[{r1}, {}], 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000000c0)={0x3, 0x9, 0x4, 0x4000, 0x3, {0x77359400}, {0x1, 0x0, 0x4, 0x20, 0x4, 0x1, "fea8a6c6"}, 0xe3, 0x2, @fd=r1, 0x2, 0x0, 0xffffffffffffffff}) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000140)={r3}) socket$kcm(0x2b, 0x6, 0x0) fchdir(0xffffffffffffffff) memfd_create(&(0x7f0000000980)='lotrusted\x1a\x00\xee\xee\x91\xdc\x04>R\xba0Qe\x80\xe3}U\x01\xd0\xa9\xc9\xf1\xc9\x8d&\x90\xf6\x1a\x86\xd8\x02\xda6E\x17\xa9d\xcfcK\xfe\xf4\x99\xb7o\xff\at\xb6C\xef\x068\xcf\xd3\xb6\xbe\x98\x02\xa0\x90\xc8[\v\x93A\x7f\xc6\xa7\xcaEB\xb9\xaeS\x99\x86RI;\x0e\xf0\xcf\x9b\xff\x01\x00\x00\x00\x00\x00\x00\xc9\x85\xe2\xc9\x8bM\x1f\xcd%\x98\x16H\x9f\xbc\xb8\xd4\v', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d25a80648c63940d0424fc600800184001ac0f00281982c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) socket$key(0xf, 0x3, 0x2) 11:13:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x500}, 0x0) 11:13:07 executing program 4: getpid() getpid() socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x1f}, &(0x7f0000000140)=0x8) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2810, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$bsg(0xffffffffffffff9c, &(0x7f0000000340)='/dev/bsg\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') sendfile(r0, r0, 0x0, 0xffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffff) 11:13:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 11:13:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r2 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x4}, 0x80, &(0x7f0000000140)=[{&(0x7f00000027c0)="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", 0xe55}], 0x1, 0x0, 0x0, 0x1a0}, 0x0) 11:13:07 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 11:13:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x600}, 0x0) 11:13:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 11:13:08 executing program 4: 11:13:08 executing program 5: 11:13:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x700}, 0x0) 11:13:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:10 executing program 4: 11:13:10 executing program 5: 11:13:10 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 11:13:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 11:13:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x2100}, 0x0) 11:13:11 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 11:13:11 executing program 5: 11:13:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x3f00}, 0x0) 11:13:11 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getpid() listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 11:13:11 executing program 5: 11:13:11 executing program 5: 11:13:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x34000}, 0x0) 11:13:14 executing program 4: 11:13:14 executing program 3: 11:13:14 executing program 5: 11:13:14 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getpid() listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 11:13:14 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getpid() listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 11:13:14 executing program 4: 11:13:14 executing program 5: 11:13:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x400300}, 0x0) 11:13:14 executing program 4: 11:13:14 executing program 5: 11:13:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:17 executing program 0: 11:13:17 executing program 4: 11:13:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x1000000}, 0x0) 11:13:17 executing program 5: 11:13:17 executing program 3: 11:13:17 executing program 5: 11:13:17 executing program 0: 11:13:17 executing program 4: 11:13:17 executing program 3: 11:13:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x2000000}, 0x0) 11:13:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:17 executing program 0: 11:13:17 executing program 5: 11:13:17 executing program 4: 11:13:17 executing program 3: 11:13:17 executing program 0: 11:13:17 executing program 5: 11:13:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x3000000}, 0x0) 11:13:17 executing program 4: 11:13:17 executing program 3: 11:13:17 executing program 5: 11:13:17 executing program 0: 11:13:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:20 executing program 4: 11:13:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x4000000}, 0x0) 11:13:20 executing program 3: 11:13:20 executing program 5: 11:13:20 executing program 0: 11:13:20 executing program 5: 11:13:20 executing program 0: 11:13:20 executing program 3: 11:13:20 executing program 4: 11:13:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x5000000}, 0x0) 11:13:20 executing program 0: 11:13:20 executing program 4: 11:13:20 executing program 5: 11:13:20 executing program 3: 11:13:21 executing program 0: 11:13:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x6000000}, 0x0) 11:13:21 executing program 4: 11:13:21 executing program 5: 11:13:21 executing program 3: 11:13:21 executing program 0: [ 684.950568][ T0] NOHZ: local_softirq_pending 08 [ 685.588708][ T0] NOHZ: local_softirq_pending 08 11:13:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:23 executing program 4: 11:13:23 executing program 5: 11:13:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x7000000}, 0x0) 11:13:23 executing program 0: 11:13:23 executing program 3: 11:13:24 executing program 5: 11:13:24 executing program 4: 11:13:24 executing program 0: 11:13:24 executing program 3: 11:13:24 executing program 4: 11:13:24 executing program 5: 11:13:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x21000000}, 0x0) 11:13:27 executing program 0: 11:13:27 executing program 3: 11:13:27 executing program 4: 11:13:27 executing program 5: 11:13:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:27 executing program 5: 11:13:27 executing program 3: 11:13:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xbb}]}}) 11:13:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000000200)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r0, &(0x7f0000004000)=[{{0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000c40)='s', 0x1}], 0x2}}], 0x1, 0x0) 11:13:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x3f000000}, 0x0) 11:13:27 executing program 5: r0 = socket$inet6(0xa, 0x805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @rand_addr=0xfffffffffffffff9}]}, &(0x7f00000002c0)=0x10) r1 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r1, 0x84, 0x81, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x1000) 11:13:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{0x0, 0x2, 0x0, [], 0xff}]}}) 11:13:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) 11:13:27 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x80ffffff}, 0x0) 11:13:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000300)="3ef2460f08f3440f1bbe54d30000c7442400dae7abe2c744240200000000c7442406000000000f011424c483657a443a002a0f0016f242af2e0f01c5660f2886941a000047f63d0000000066baf80cb8fad8ee88ef66bafc0c66ed", 0x5b}], 0x1, 0x40, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000080)=0x4) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:27 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) socket(0x2000000011, 0x2, 0x0) unshare(0x40600) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) socket$nl_route(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 11:13:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0xfbffffff}, 0x0) 11:13:27 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_udplite(0xa, 0x2, 0x88) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)) socket$inet(0x2, 0x803, 0xa0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 11:13:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0xffffff7f}, 0x0) 11:13:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0xffffff80}, 0x0) 11:13:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0xfffffffb}, 0x0) 11:13:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x1000000000000}, 0x0) 11:13:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:30 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x40030000000000}, 0x0) 11:13:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000240)={0x9}) 11:13:30 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) socket(0x2000000011, 0x2, 0x0) unshare(0x40600) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) socket$nl_route(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 11:13:30 executing program 5: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) socket(0x2000000011, 0x2, 0x0) unshare(0x40600) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) socket$nl_route(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 11:13:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x100000000000000}, 0x0) 11:13:30 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) dup(r0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r2, &(0x7f0000000380)=""/87, 0x1f7) getdents64(r2, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 11:13:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x200000000000000}, 0x0) 11:13:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{0x0, 0x9, 0x0, [], 0xff}]}}) 11:13:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x300000000000000}, 0x0) 11:13:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) 11:13:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x400000000000000}, 0x0) 11:13:33 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x3ad00, 0x124) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x1) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000240)="8ea3643da53b0e962615242726d89a831fa82bc6623fefd46db20431fc62e6752306513118d601c51c0f3ecaa8cbb403b32493b18155b59bfc520421777eb4125df16c4357c458e904ff0f701b811348def195480d3a726c333cdbfca61e02cd9e018171aabc1185eda73b5c6ab21027ba6e6ca3cc9ce76e3c95422a5eefadf71e80ea837c3d652d551e05e52310e77cdce079fa05eb322ad7c185104bcc453fc1479d7136b01bc67b35566bf61af33e709ff29c7a999a03574e9226225490db8aa99747a441c4fee632a3482b53fc", 0xcf}, {&(0x7f00000000c0)="ca5e00c95cf34713e3186a262f6b3cebaca9cc81878ac66779a09b6071062138d708dba2a85e1ec5f60697dcc60ab345", 0x30}, {&(0x7f0000000100)="0661a32e265ce8a7627d301a8f2abd8cd03e669e8fbef0f67d8b185b450fdbca8a1f95e1faf8a102bec80dc49824cd4c6f7baa0af61c312cc9f94d5e589e6f9cc062cd9d70b94f4d0f3b01352387087c0fb14cb5d185b1a885db59d2cecaeefd1f1f", 0x62}, {&(0x7f0000000340)="eca74a3409667207ee28c9559c7de7d3b3a4c9d0d4d9b63ca25f", 0x1a}, {&(0x7f0000000740)="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", 0xe86}, {&(0x7f0000001740)="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", 0x8c1}], 0x6) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x3000, 0x1000}, 0xff50) 11:13:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:33 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/18, 0x33c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000380)={0x5}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r0, 0x1000000000015) 11:13:33 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{0x0, 0x9, 0x0, [], 0xff}, {0x0, 0x81}]}}) 11:13:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000004c0)='4', 0x1, 0x4080, 0x0, 0x0) 11:13:33 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x4}, 0x80, &(0x7f0000000140)=[{&(0x7f00000027c0)="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", 0x1077}], 0x1, 0x0, 0x0, 0x1a0}, 0x10000800) 11:13:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x500000000000000}, 0x0) 11:13:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$USBDEVFS_DISCSIGNAL(0xffffffffffffffff, 0x8010550e, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0x0, 0x0, 0x110, 0x0, 0x0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x1a0, 0x3, 0x0, {[{{@ip={@broadcast, @loopback, 0x0, 0x0, 'vxcan1\x00', 'veth0_to_bond\x00'}, 0x0, 0xa0, 0x110, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "f5c2aed3cb4cb9e876ecb69162df702fc595a0de2f4cab658bf43b2f11d670ae5eff39c52452f3742c26f20349b9d6bd16c5635ff36c545395c8330ed68cbb5e"}}}, {{@ip={@local, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'vlan0\x00', 'bond0\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) 11:13:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{0x0, 0x9}]}}) 11:13:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x600000000000000}, 0x0) 11:13:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000000)) 11:13:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioprio_set$pid(0x3, 0x0, 0x0) 11:13:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x700000000000000}, 0x0) 11:13:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000015000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, 0x0}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 11:13:36 executing program 3: syz_emit_ethernet(0x66, &(0x7f00000002c0)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "93069b", 0x0, 0x0, 0x0, @mcast2, @local}}}}}}}, 0x0) 11:13:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000600)=0x1fffffff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 11:13:36 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000600)=0x1fffffff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 11:13:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000600)=0x1fffffff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 11:13:37 executing program 5: unshare(0x20020000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') 11:13:37 executing program 0: syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000012c0)='./file0\x00', 0x0, 0x808a0, &(0x7f0000001340)={[{@mode={'mode'}}]}) 11:13:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x2100000000000000}, 0x0) 11:13:37 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x58, 0x0, 0x9, 0x201, 0x0, 0x0, {}, [@NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 699.335238][T28317] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 699.344072][T28317] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 11:13:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000600)=0x1fffffff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 11:13:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x3f00000000000000}, 0x0) 11:13:39 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe0, 0x0) 11:13:39 executing program 5: r0 = open$dir(&(0x7f0000000900)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) ftruncate(r1, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/235, 0x3ffff}], 0x1, 0x0) 11:13:39 executing program 3: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x30, 0xffffffffffffffff, 0x4a09a000) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0xffffffffffffff2b) shmget(0x3, 0x4000, 0x1000, &(0x7f0000ff9000/0x4000)=nil) prctl$PR_SVE_SET_VL(0x32, 0x23eb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$admmidi(&(0x7f00000015c0)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$MON_IOCG_STATS(r2, 0x80089203, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 11:13:40 executing program 5: semget(0x2, 0x2, 0x620) 11:13:40 executing program 0: shmget(0x1, 0x2000, 0x16a, &(0x7f0000ffe000/0x2000)=nil) 11:13:40 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2001000000005, &(0x7f0000000000), 0x4) r1 = dup2(0xffffffffffffffff, r0) getsockname$inet(r0, &(0x7f0000000040), &(0x7f0000000180)=0xc) sendto$inet6(r1, &(0x7f0000000100)="3a0ce948c6e1d7fa67956f6100b8268a8dd648d6c93d453a3415b6f74323e311487687671e3cbf1b2967d38ce0ba82b4a5b865da8f2b5d95d5657a6294c03afce418", 0x42, 0x0, &(0x7f0000000080)={0x18, 0x3, 0xfffff252}, 0xc) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) r2 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r3 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) dup2(r2, r4) 11:13:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x8000000000000000}, 0x0) 11:13:40 executing program 5: msgget(0x3, 0x790) 11:13:40 executing program 0: r0 = socket(0x400000000018, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80b, &(0x7f0000000300)={0x2, 0x2}, 0xc) 11:13:40 executing program 3: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x0) [ 703.508606][ T0] NOHZ: local_softirq_pending 08 11:13:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x80ffffff00000000}, 0x0) 11:13:43 executing program 5: creat(&(0x7f0000000200)='./file0\x00', 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x2000276bf, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x218, 0x0, 0x0}, 0x40) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) 11:13:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 11:13:43 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe0, 0x0) 11:13:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 11:13:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0xfbffffff00000000}, 0x0) [ 705.154139][T28385] NFS: Device name not specified 11:13:43 executing program 0: creat(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000276bf, 0x7}, 0x0, 0x0, r3, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x218, 0x0, 0x0}, 0x40) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) 11:13:43 executing program 0: creat(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000276bf, 0x7}, 0x0, 0x0, r3, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x218, 0x0, 0x0}, 0x40) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) 11:13:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0xffffff7f00000000}, 0x0) [ 705.313436][T28397] NFS: Device name not specified 11:13:43 executing program 5: creat(&(0x7f0000000200)='./file0\x00', 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', 0x0, &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240)}, 0x2000276bf, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x218, 0x0, 0x0}, 0x40) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) [ 705.375047][T28399] NFS: Device name not specified 11:13:43 executing program 3: mkdir(0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) pipe(0x0) r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) stat(0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local}}, {{@in=@empty}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) [ 705.474744][T28405] NFS: Device name not specified 11:13:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x2}, 0x0) 11:13:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) socket(0x100000000011, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semop(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) semctl$GETNCNT(0x0, 0x2, 0xe, 0x0) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0, 0x100800) getsockname(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) r5 = socket$inet6(0xa, 0x3, 0x1) r6 = semget$private(0x0, 0x0, 0x4) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, 0x0, 0xee01, 0x0, 0x50, 0x2}, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4}) semctl$GETPID(r6, 0x2, 0xb, &(0x7f0000000180)=""/4) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r5, &(0x7f0000000480), 0x2e9, 0xfec0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 11:13:46 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x13, &(0x7f0000000140)=0x20000031, 0x4) 11:13:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x50, 0x0, 0x4, 0x70bd29, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x10000}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xb4f7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xd330}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x890}, 0x4041) r2 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) 11:13:46 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe0, 0x0) 11:13:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x78000050, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x0, 0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0xfffffffffffffe64, 0x0}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000c40)=[{&(0x7f0000000a80)=""/132}, {&(0x7f0000000b40)=""/195}], 0x3c6, 0x0) 11:13:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x3}, 0x0) 11:13:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:13:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:13:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket(0x100000000011, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semop(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) semctl$GETNCNT(0x0, 0x2, 0xe, 0x0) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0, 0x100800) getsockname(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) r5 = socket$inet6(0xa, 0x3, 0x1) r6 = semget$private(0x0, 0x0, 0x4) semctl$GETPID(r6, 0x2, 0xb, &(0x7f0000000180)=""/4) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r5, &(0x7f0000000480), 0x2e9, 0xfec0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 11:13:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x78000050, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x0, 0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0xfffffffffffffe64, 0x0}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000c40)=[{&(0x7f0000000a80)=""/132}, {&(0x7f0000000b40)=""/195}], 0x3c6, 0x0) 11:13:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 11:13:47 executing program 5: r0 = socket(0x2000000000000010, 0x1000040000000003, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0xe7e1d) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000340)=""/220, 0x0) socket$inet6(0xa, 0x2, 0x0) getpid() pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000200)="99245b2e6972731d959a35fdda251e35ceb8ee43918959f7dd7b24d017bea99bcdbbb8a6b67464cb73e2a641e8ca5f85c082b2f3692082a4a4ef49fe789ca3ca92403dc6143c6246066422fc8d18fe2d0a90e12cd6c49af49d10783a6e1a45", 0x5f}], 0x1, 0x0) r6 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x3, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b19, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x0, r6}) fcntl$setpipe(r4, 0x407, 0x0) r9 = creat(0x0, 0x1cb) ioctl$DRM_IOCTL_GET_CLIENT(r9, 0xc0286405, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:13:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x4}, 0x0) 11:13:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:47 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x35) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@dev}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, 0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x7, &(0x7f0000000680)={@multicast1, @local}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7e44350b1948a983}, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r7 = socket$inet(0x2, 0x803, 0xa0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) connect(r7, &(0x7f0000000340)=@ethernet={0x0, @local}, 0x80) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000640)) r8 = socket(0x10, 0x800000000000803, 0x0) sendto(r8, &(0x7f0000000000)="120000001600e70d017b00d473fc00000000", 0x12, 0x0, 0x0, 0xaee6dae35afa37fd) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000d80)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000b00)) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r9 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r9, 0x7ffffb, 0x0) r10 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$EXT4_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000480)=0x8040) r11 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) r12 = socket$inet6(0xa, 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r12, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r12, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) r13 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) r14 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) write$binfmt_elf64(r12, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x8) fallocate(r9, 0x100000003, 0xfb7d, 0x28120001) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e0030002ac1414aa00b08d100201e0000001000000000000"], 0x18) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRES64, @ANYPTR64, @ANYPTR], @ANYBLOB="0b0c68c061ddfd0226efbe0ac37183feee3005b1f8f96abe86a1e3a2f1ec5c2fe76d648e087eb0e99cdb0931efd62d310afc40a3f57bbc57", @ANYRES32]], 0x8) 11:13:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x78000050, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x0, 0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0xfffffffffffffe64, 0x0}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000c40)=[{&(0x7f0000000a80)=""/132}, {&(0x7f0000000b40)=""/195}], 0x3c6, 0x0) 11:13:47 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x5}, 0x0) 11:13:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @random='\x00\x00\x00\x00\\\x00'}, 0x0, {0x2, 0x0, @remote}}) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0) dup(0xffffffffffffffff) 11:13:47 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x35) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@dev}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, 0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x7, &(0x7f0000000680)={@multicast1, @local}, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000b00)) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) r4 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) r5 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000540)=ANY=[@ANYRES64=r5, @ANYPTR, @ANYPTR64, @ANYRESHEX, @ANYRESDEC, @ANYPTR, @ANYRESOCT=0x0, @ANYRESHEX], @ANYRES64]], 0x8) socket$inet(0x2, 0x2, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x0, &(0x7f0000000740)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local}, 0xc) 11:13:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x6}, 0x0) 11:13:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(0x0, &(0x7f00000004c0)='./bus\x00', 0x0, 0x0, 0x0, 0x2001002, 0x0) 11:13:48 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:48 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x2000, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x1a7) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x3) connect(0xffffffffffffffff, &(0x7f0000000340)=@ethernet={0x306, @local}, 0x80) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) stat(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000b00)) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000880)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r3, 0x0) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./bus\x00', &(0x7f0000000300)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000bc0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r4, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r5, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) shmat(0x0, &(0x7f0000ff6000/0x4000)=nil, 0x6ffd) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x28120001) r6 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x200000000005, 0x3) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0x0) r7 = creat(0x0, 0x0) lseek(r7, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r7, 0x0, 0x0, 0x28120001) creat(&(0x7f0000000240)='./bus\x00', 0x0) r8 = syz_open_dev$sndseq(0x0, 0x0, 0x0) fallocate(r8, 0x100000003, 0xfb7d, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0xa2ffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0xa2ffff) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000d00)=ANY=[@ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030300900000000000800756a08725f29243d06011939d1b1a0325a27d69506b3cb3c34750d33ca606eb567b1dcbae94c47b20afdd3f303ba", @ANYBLOB="8b2ddb12cd7c8609e844b461028691e1", @ANYRESDEC=0x0, @ANYBLOB="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"]) 11:13:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x7}, 0x0) 11:13:48 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket(0x100000000011, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semop(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) semctl$GETNCNT(0x0, 0x2, 0xe, 0x0) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0, 0x100800) getsockname(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) r5 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r5, &(0x7f0000000480), 0x2e9, 0xfec0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 11:13:48 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:48 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 710.320861][T28538] ptrace attach of "/root/syz-executor.2"[28537] was attempted by "/root/syz-executor.2"[28538] 11:13:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x21}, 0x0) 11:13:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 11:13:48 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 710.516809][T28561] ptrace attach of "/root/syz-executor.2"[28558] was attempted by "/root/syz-executor.2"[28561] 11:13:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a49fd22044869bdc0ff0cafdc092dd3e5f2728dd3738ee9f375d8979e09ca1426274eb04340008dc12de7d12a2d1d991f680b02e12bda5c121bb117443b7e280108d7266a4dd4d0b7e8a84682022113d1500769590a30515a460efd4b03f51f3161691c91d3c5b79ac9da66bc7b62c20c10080c9e461665114763f5126b747f67748382aac2179", 0xd2}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:48 executing program 0: getpid() pipe(&(0x7f0000000300)) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @random='\x00\x00\x00\x00\\\x00'}, 0x0, {0x2, 0x0, @remote}}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0) setresgid(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 11:13:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x300}, 0x0) [ 710.671993][T28569] ptrace attach of "/root/syz-executor.2"[28568] was attempted by "/root/syz-executor.2"[28569] 11:13:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket(0x100000000011, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semop(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) semctl$GETNCNT(0x0, 0x2, 0xe, 0x0) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0, 0x100800) getsockname(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) r5 = socket$inet6(0xa, 0x3, 0x1) r6 = semget$private(0x0, 0x0, 0x4) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, 0x0, 0xee01, 0x0, 0x50, 0x2}, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4}) semctl$GETPID(r6, 0x2, 0xb, &(0x7f0000000180)=""/4) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r5, &(0x7f0000000480), 0x2e9, 0xfec0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 11:13:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x500}, 0x0) 11:13:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:49 executing program 0: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) socket(0x0, 0x800000000000803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000440)) stat(0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r0 = creat(0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local}}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 11:13:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x600}, 0x0) 11:13:49 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000003bb, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket(0x100000000011, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semop(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) semctl$GETNCNT(0x0, 0x2, 0xe, 0x0) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0, 0x100800) getsockname(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) r5 = socket$inet6(0xa, 0x3, 0x1) r6 = semget$private(0x0, 0x0, 0x4) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, 0x0, 0xee01, 0x0, 0x50, 0x2}, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4}) semctl$GETPID(r6, 0x2, 0xb, &(0x7f0000000180)=""/4) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r5, &(0x7f0000000480), 0x2e9, 0xfec0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 11:13:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x100) fcntl$setstatus(r1, 0x4, 0x6100) readv(0xffffffffffffffff, &(0x7f00000007c0), 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0x401, [0x4, 0x5]}, 0x10) keyctl$get_keyring_id(0x0, 0x0, 0x0) creat(0x0, 0x0) ftruncate(r1, 0x8200) prctl$PR_GET_KEEPCAPS(0x7) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000006000/0x2000)=nil, 0x2000}, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x80040) fstat(r2, &(0x7f00000002c0)) clock_getres(0x4, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x818) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 11:13:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x700}, 0x0) 11:13:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) getpgrp(0x0) 11:13:51 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 11:13:51 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x2100}, 0x0) 11:13:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608cee37cbd368e198a3af0ee0aedc3a8149ccfcfecf498ff8f47950289c2967426acd846a4", 0x4c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:51 executing program 3: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local}}, {{@in=@empty}, 0x0, @in6=@local}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet(0x2, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:13:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x100) fcntl$setstatus(r1, 0x4, 0x6100) readv(0xffffffffffffffff, &(0x7f00000007c0), 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0x401, [0x4, 0x5]}, 0x10) keyctl$get_keyring_id(0x0, 0x0, 0x0) creat(0x0, 0x0) ftruncate(r1, 0x8200) prctl$PR_GET_KEEPCAPS(0x7) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000006000/0x2000)=nil, 0x2000}, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x80040) fstat(r2, &(0x7f00000002c0)) clock_getres(0x4, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x818) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 11:13:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x3f00}, 0x0) 11:13:52 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) pipe2(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffdfffe) 11:13:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x34000}, 0x0) 11:13:52 executing program 5: [ 714.490759][ T26] audit: type=1804 audit(1582024432.502:93): pid=28711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir788499306/syzkaller.JYXquX/1037/bus" dev="sda1" ino=17209 res=1 [ 714.545625][ T26] audit: type=1804 audit(1582024432.552:94): pid=28711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir788499306/syzkaller.JYXquX/1037/bus" dev="sda1" ino=17209 res=1 11:13:52 executing program 0: 11:13:52 executing program 5: 11:13:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x400300}, 0x0) 11:13:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:52 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) pipe2(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffdfffe) 11:13:53 executing program 5: 11:13:53 executing program 0: [ 714.970328][ T26] audit: type=1804 audit(1582024432.982:95): pid=28730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir788499306/syzkaller.JYXquX/1038/bus" dev="sda1" ino=17212 res=1 11:13:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x1000000}, 0x0) 11:13:55 executing program 3: 11:13:55 executing program 0: 11:13:55 executing program 5: 11:13:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:55 executing program 3: 11:13:55 executing program 5: 11:13:55 executing program 0: 11:13:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x2000000}, 0x0) 11:13:55 executing program 3: 11:13:55 executing program 0: 11:13:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:13:58 executing program 5: 11:13:58 executing program 3: 11:13:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x3000000}, 0x0) 11:13:58 executing program 0: 11:13:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:13:58 executing program 5: 11:13:58 executing program 3: 11:13:58 executing program 0: 11:13:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x4000000}, 0x0) 11:13:58 executing program 5: 11:13:58 executing program 0: 11:14:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:01 executing program 3: 11:14:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x5000000}, 0x0) 11:14:01 executing program 0: 11:14:01 executing program 5: 11:14:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:14:01 executing program 3: 11:14:01 executing program 0: 11:14:01 executing program 5: 11:14:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x6000000}, 0x0) 11:14:01 executing program 3: 11:14:01 executing program 0: [ 723.988915][ T0] NOHZ: local_softirq_pending 08 [ 723.994860][ T0] NOHZ: local_softirq_pending 08 11:14:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:04 executing program 5: 11:14:04 executing program 3: 11:14:04 executing program 0: 11:14:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x7000000}, 0x0) 11:14:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 11:14:04 executing program 5: 11:14:04 executing program 0: 11:14:04 executing program 3: 11:14:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x21000000}, 0x0) 11:14:04 executing program 5: 11:14:04 executing program 3: 11:14:07 executing program 0: 11:14:07 executing program 5: 11:14:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x3f000000}, 0x0) 11:14:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:07 executing program 3: 11:14:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 11:14:07 executing program 0: 11:14:07 executing program 5: 11:14:07 executing program 3: 11:14:07 executing program 5: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000100)) 11:14:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x80ffffff}, 0x0) 11:14:07 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x7}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) [ 729.814030][T28866] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 11:14:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, 0x0) 11:14:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000100)) 11:14:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 730.032364][T28878] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize [ 730.051555][T28879] EXT4-fs warning (device sda1): ext4_group_add:1622: No reserved GDT blocks, can't resize 11:14:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0xfbffffff}, 0x0) 11:14:10 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffff48, 0x0}, 0x30) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400add427323b470c458c560a", 0x11}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet6(0xa, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x20000000010004, 0x0) 11:14:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000200060ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) dup(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 11:14:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, 0x0) 11:14:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) [ 732.715026][T28895] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 732.724409][T28895] device veth0_to_bond entered promiscuous mode 11:14:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 732.833862][T28895] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. 11:14:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 733.036750][T28917] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0xffffff80}, 0x0) 11:14:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 733.119115][T28922] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 733.226717][T28929] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? [ 733.329093][T28932] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0xfffffffb}, 0x0) 11:14:13 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB]) 11:14:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:13 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 11:14:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000240)) 11:14:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) socket$packet(0x11, 0x0, 0x300) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r2) dup3(r1, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000200)=@rose={'rose', 0x0}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x810) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d003f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) creat(&(0x7f0000000280)='./bus\x00', 0x23) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 11:14:13 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB]) 11:14:14 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x1000000000000}, 0x0) 11:14:14 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 736.228935][T28973] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x40030000000000}, 0x0) 11:14:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:16 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:16 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000200)='Cpuacct.@TE\xae\x00', 0x4) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x2300, 0x1e5) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x3bc57a74abd2ea60) fallocate(r2, 0x8, 0xfffffffffffffffd, 0x2000002) poll(&(0x7f0000000100), 0x22da, 0x40009) fallocate(r0, 0x800000000000002, 0x6, 0xffffffff) r3 = getpid() ptrace(0x10, r3) ptrace$poke(0x21, r3, 0x0, 0x4) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x440000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x90802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x1120, 0x0, 0x4, 0x0, 0x200, 0xfffffffd}, 0x0, 0x0, r4, 0x0) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) dup2(r4, r5) r6 = creat(&(0x7f0000001c00)='./bus\x00', 0xa1) r7 = socket$inet6(0xa, 0x400000000001, 0x0) accept4(r6, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f00000002c0)=0x80, 0x80000) r8 = dup(r7) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x400, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) getegid() ftruncate(r6, 0x800fe) socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2ea}, 0x0) socket$inet(0x10, 0x3, 0xc) sendfile(r8, r9, 0x0, 0x8000fffffffe) 11:14:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) 11:14:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) socket$packet(0x11, 0x0, 0x300) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r2) dup3(r1, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000200)=@rose={'rose', 0x0}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x810) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d003f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) creat(&(0x7f0000000280)='./bus\x00', 0x23) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 738.940219][T28989] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) 11:14:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x100000000000000}, 0x0) 11:14:17 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 739.179040][T29001] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 11:14:17 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x200000000000000}, 0x0) 11:14:17 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x2) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x200000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x840000000002, 0x3, 0x200000000000ff) getsockname(r3, &(0x7f00000003c0)=@tipc=@id, &(0x7f0000000180)=0xffffffffffffff7f) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x24000) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r5, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000002c0)) ptrace(0x10, r6) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) mount(0x0, 0x0, &(0x7f00000001c0)='sysfs\x00', 0x0, &(0x7f0000000000)) [ 739.364159][T29010] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:19 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x300000000000000}, 0x0) 11:14:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioperm(0x0, 0x9, 0x0) 11:14:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x237, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 11:14:19 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) [ 741.976130][T29031] cgroup: fork rejected by pids controller in /syz0 [ 741.991773][T29031] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:20 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x6000, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) finit_module(0xffffffffffffffff, 0x0, 0x5) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) syz_mount_image$nfs4(&(0x7f0000000180)='nfs4\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0xec, 0x0, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1}}, {0x14, 0x2, @in={0x2, 0x0, @local}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x74}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xc16}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x48080}, 0x4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) 11:14:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x400000000000000}, 0x0) 11:14:20 executing program 5: ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x237, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 742.176310][T29047] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 742.336413][T29059] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? [ 742.360460][ T26] audit: type=1804 audit(1582024460.372:96): pid=29051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir788499306/syzkaller.JYXquX/1058/bus" dev="sda1" ino=17283 res=1 11:14:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 742.513852][T29068] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? [ 742.628031][ T26] audit: type=1804 audit(1582024460.632:97): pid=29064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir788499306/syzkaller.JYXquX/1058/bus" dev="sda1" ino=17283 res=1 11:14:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x500000000000000}, 0x0) 11:14:23 executing program 5: 11:14:23 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:23 executing program 3: 11:14:23 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 11:14:23 executing program 5: 11:14:23 executing program 3: [ 745.151083][T29085] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:23 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x600000000000000}, 0x0) 11:14:23 executing program 5: [ 745.311374][T29095] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:23 executing program 3: [ 746.388440][ T0] NOHZ: local_softirq_pending 08 11:14:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:26 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:26 executing program 5: 11:14:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x700000000000000}, 0x0) 11:14:26 executing program 3: 11:14:26 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 11:14:26 executing program 3: 11:14:26 executing program 5: [ 748.215366][T29117] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:26 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x2100000000000000}, 0x0) 11:14:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000200060ada971b40d805000300c50083", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 11:14:26 executing program 3: [ 748.445501][T29130] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? [ 748.539229][T29134] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 748.560244][T29134] device veth0_to_bond entered promiscuous mode 11:14:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616", 0x26}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 11:14:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:14:29 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0xb7df}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:14:29 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 751.294965][T29147] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 751.336097][T29148] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 11:14:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x8000000000000000}, 0x0) 11:14:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000180)={r0}) 11:14:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 751.496294][T29165] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 751.606482][T29172] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? [ 751.745048][T29179] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? [ 751.757503][T29182] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616", 0x26}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0x80ffffff00000000}, 0x0) 11:14:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000180)={r0}) 11:14:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) 11:14:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100840001"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 11:14:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616", 0x26}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x69811d8bbf261119, 0x0, 0xffffffffffffff92, 0x0, 0xfffffffffffffe48}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:14:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 754.395100][T29195] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? [ 754.416277][T29200] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000180)={r0}) 11:14:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x507, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x6, 0x9, 0x108, 0x0, "29b676af8e922f5cce59fb634ffa8ec558081a9dd24d2a340ca98079c6076b86a8"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0xa0}, 0x1, 0x0, 0xfbffffff00000000}, 0x0) [ 754.575314][T29210] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? 11:14:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000180)={r0}) 11:14:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @rand_addr=0x3}, 0x10) [ 754.752598][T29221] RDS: rds_bind could not find a transport for ::ffff:0.0.0.3, load rds_tcp or rds_rdma? [ 755.205275][T29190] ================================================================== [ 755.213536][T29190] BUG: KCSAN: data-race in complete_signal / do_group_exit [ 755.220770][T29190] [ 755.223100][T29190] write to 0xffff888121913234 of 4 bytes by task 29198 on cpu 0: [ 755.230874][T29190] complete_signal+0x530/0x5e0 [ 755.235628][T29190] __send_signal+0x5ea/0x870 [ 755.240202][T29190] send_signal+0x224/0x2b0 [ 755.244696][T29190] do_send_sig_info+0x5f/0xc0 [ 755.249383][T29190] send_sig+0x5f/0x80 [ 755.253366][T29190] pipe_write+0xc5b/0xd80 [ 755.257681][T29190] new_sync_write+0x388/0x4a0 [ 755.262340][T29190] __vfs_write+0xb1/0xc0 [ 755.266565][T29190] vfs_write+0x18a/0x390 [ 755.270787][T29190] ksys_write+0x17b/0x1b0 [ 755.275111][T29190] __x64_sys_write+0x4c/0x60 [ 755.279688][T29190] do_syscall_64+0xcc/0x3a0 [ 755.284178][T29190] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.290049][T29190] [ 755.292364][T29190] read to 0xffff888121913234 of 4 bytes by task 29190 on cpu 1: [ 755.299998][T29190] do_group_exit+0x7b/0x1c0 [ 755.304483][T29190] __x64_sys_exit_group+0x2e/0x30 [ 755.309502][T29190] do_syscall_64+0xcc/0x3a0 [ 755.314001][T29190] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.319882][T29190] [ 755.322360][T29190] Reported by Kernel Concurrency Sanitizer on: [ 755.328495][T29190] CPU: 1 PID: 29190 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 755.337142][T29190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.347309][T29190] ================================================================== [ 755.355357][T29190] Kernel panic - not syncing: panic_on_warn set ... [ 755.361942][T29190] CPU: 1 PID: 29190 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 755.370591][T29190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.380645][T29190] Call Trace: [ 755.383927][T29190] dump_stack+0x11d/0x181 [ 755.388243][T29190] panic+0x210/0x640 [ 755.392134][T29190] ? vprintk_func+0x8d/0x140 [ 755.396722][T29190] kcsan_report.cold+0xc/0x1a [ 755.401388][T29190] kcsan_setup_watchpoint+0x3a3/0x3e0 [ 755.406759][T29190] __tsan_read4+0xc6/0x100 [ 755.411169][T29190] do_group_exit+0x7b/0x1c0 [ 755.415686][T29190] ? __close_fd+0xfc/0x140 [ 755.420104][T29190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 755.426336][T29190] __x64_sys_exit_group+0x2e/0x30 [ 755.431357][T29190] do_syscall_64+0xcc/0x3a0 [ 755.435851][T29190] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.441724][T29190] RIP: 0033:0x45c6b9 [ 755.445668][T29190] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.465275][T29190] RSP: 002b:00007fffa695c448 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 755.473671][T29190] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045c6b9 [ 755.481682][T29190] RDX: 0000000000416251 RSI: fffffffffffffff7 RDI: 0000000000000000 [ 755.489972][T29190] RBP: 0000000000000000 R08: 0000000089cf5eb1 R09: 00007fffa695c4a0 [ 755.497957][T29190] R10: 0000000089cf5ead R11: 0000000000000246 R12: 0000000000000000 [ 755.505926][T29190] R13: 00007fffa695c4a0 R14: 0000000000000000 R15: 00007fffa695c4b0 [ 755.515310][T29190] Kernel Offset: disabled [ 755.519638][T29190] Rebooting in 86400 seconds..