x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:12 executing program 1: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:12 executing program 2: socket(0x0, 0x0, 0x0) ioctl$TCSETX(0xffffffffffffffff, 0x5433, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) 03:35:12 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:12 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) 03:35:12 executing program 1: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) [ 363.152318][T17492] IPVS: ftp: loaded support on port[0] = 21 03:35:12 executing program 2: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010f02000270f7f8", 0x16}], 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 03:35:12 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:12 executing program 1: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) [ 363.550560][T17520] FAT-fs (loop2): Directory bread(block 3841) failed [ 363.588400][T17520] FAT-fs (loop2): Directory bread(block 3842) failed [ 363.595246][T17520] FAT-fs (loop2): Directory bread(block 3843) failed [ 363.595284][T17520] FAT-fs (loop2): Directory bread(block 3844) failed [ 363.595304][T17520] FAT-fs (loop2): Directory bread(block 3845) failed [ 363.695836][T17520] FAT-fs (loop2): Directory bread(block 3846) failed [ 363.717450][T17520] FAT-fs (loop2): Directory bread(block 3847) failed [ 363.737423][T17520] FAT-fs (loop2): Directory bread(block 3848) failed 03:35:13 executing program 3: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) 03:35:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:13 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:13 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) [ 363.744273][T17520] FAT-fs (loop2): Directory bread(block 3849) failed [ 363.751175][T17520] FAT-fs (loop2): Directory bread(block 3850) failed 03:35:13 executing program 2: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010f02000270f7f8", 0x16}], 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 03:35:13 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:13 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) [ 364.009399][T17541] IPVS: ftp: loaded support on port[0] = 21 03:35:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:13 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:13 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:13 executing program 3: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) 03:35:13 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:13 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:13 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:13 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:13 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:13 executing program 3: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) 03:35:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:14 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:14 executing program 3: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) 03:35:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(0x0, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:14 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000140)={[{0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) 03:35:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(0x0, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:14 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) [ 365.530175][T17643] pit: kvm: requested 5028 ns i8254 timer period limited to 200000 ns 03:35:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:14 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(0x0, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20) recvmmsg(r0, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:35:14 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:15 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:15 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:15 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x1, 0xb09, 0x40}) 03:35:15 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x1, 0xb09, 0x40}) 03:35:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:15 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:16 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:16 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:16 executing program 3: 03:35:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:16 executing program 3: 03:35:16 executing program 2: socketpair(0x0, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:16 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:16 executing program 3: 03:35:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:16 executing program 2: socketpair(0x0, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:16 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:16 executing program 3: 03:35:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:16 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:16 executing program 3: 03:35:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:17 executing program 2: socketpair(0x0, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:17 executing program 3: 03:35:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:17 executing program 2: socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:17 executing program 3: accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:35:17 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:17 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) 03:35:17 executing program 2: socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:17 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:17 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:17 executing program 3: ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f00000000c0)={0x0, 0x5}) 03:35:17 executing program 0: r0 = socket$inet(0x2, 0x0, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:17 executing program 2: socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:17 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:17 executing program 3: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000000)=0x80) 03:35:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:18 executing program 0: r0 = socket$inet(0x2, 0x0, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:18 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:18 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 03:35:18 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:18 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:18 executing program 0: r0 = socket$inet(0x2, 0x0, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:18 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, 0x0) 03:35:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:18 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:18 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @empty}, 0x10) 03:35:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:18 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:18 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff}) sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:18 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) flistxattr(r0, 0x0, 0xcfbc4236e5bddf0c) 03:35:18 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:18 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff}) sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:18 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:18 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r0, 0x0, 0x23, &(0x7f00000001c0)={@multicast2, @local}, 0x10) 03:35:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:19 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff}) sendmsg$key(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x379, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf684b"], 0x229}}, 0x0) 03:35:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='statm\x00') readv(r0, &(0x7f0000001780)=[{&(0x7f0000000080)=""/27, 0x1b}], 0x1) 03:35:19 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:19 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, 0x0, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) 03:35:19 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x004\xce\t*\x81\xc8\xcc\x9c0\xd8\x8fp\x98\xbe\xab\x1fb\n\v\xfe\xb2\xb2\xd3\xf6\"ye\x82U\xc6\xb8\x14\x8a{4\x90hK') 03:35:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:19 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) 03:35:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:19 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, 0x0, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') write(r0, 0x0, 0x0) 03:35:19 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780), 0x0, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:19 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:19 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, 0x0, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) 03:35:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800a1695e1dcfe87b1071") syz_init_net_socket$x25(0x9, 0x5, 0x0) 03:35:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:35:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0), 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:20 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780), 0x0, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:35:20 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') 03:35:20 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0), 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:20 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:35:20 executing program 3: clone(0xf00, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:35:20 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:20 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0), 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:20 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 03:35:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780), 0x0, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:20 executing program 3: clone(0xf00, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:35:20 executing program 3: clone(0xf00, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:35:20 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 03:35:20 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={0x0}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:20 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:20 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0xfd, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:20 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:20 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={0x0}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 03:35:21 executing program 3: clone(0xf00, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:35:21 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:21 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 03:35:21 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0xfd, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:21 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={0x0}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:21 executing program 3: socket$inet6(0xa, 0x0, 0x0) 03:35:21 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 03:35:21 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0xfd, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:21 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:21 executing program 3: socket$inet6(0xa, 0x0, 0x0) 03:35:21 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:21 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:21 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 03:35:21 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x17b, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:21 executing program 3: socket$inet6(0xa, 0x0, 0x0) 03:35:21 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 03:35:22 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1}, 0x0) 03:35:22 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:22 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:35:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 03:35:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x17b, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:22 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:22 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, 0x0, 0x0) 03:35:22 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 03:35:22 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:35:22 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, 0x0, 0x0) 03:35:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x17b, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:22 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:22 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2"], 0x1}}, 0x0) 03:35:22 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, 0x0, 0x0) 03:35:22 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:22 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2"], 0x1}}, 0x0) 03:35:22 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 03:35:22 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1ba, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2"], 0x1}}, 0x0) 03:35:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/49, 0x31}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:23 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:35:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a17b5e1dcfe87b1071") clock_getres(0x3, 0x0) 03:35:23 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:23 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:35:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048"], 0x1}}, 0x0) 03:35:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1ba, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/49, 0x31}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:23 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x0, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:23 executing program 3: clone(0xc0e9000, 0x0, 0x0, 0x0, 0x0) 03:35:23 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:35:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048"], 0x1}}, 0x0) 03:35:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/49, 0x31}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1ba, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048"], 0x1}}, 0x0) 03:35:23 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x0, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:23 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)}, 0x0) 03:35:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc35"], 0x1}}, 0x0) 03:35:23 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1da, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:23 executing program 3: clone(0xf00, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, 0x0) 03:35:23 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)}, 0x0) 03:35:23 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x0, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc35"], 0x1}}, 0x0) 03:35:23 executing program 3: 03:35:23 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)}, 0x0) 03:35:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1da, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:24 executing program 3: 03:35:24 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc35"], 0x1}}, 0x0) 03:35:24 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:24 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{0x0}], 0x1}, 0x0) 03:35:24 executing program 3: 03:35:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0"], 0x1}}, 0x0) 03:35:24 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{0x0}], 0x1}, 0x0) 03:35:24 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:24 executing program 3: 03:35:24 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="2467cecf8eb1ab923e736b24f8b72cce31345d6c26464b0034641aad5d1d7ea8bc35541fa2dc8297ddb71df3da169a3e406ccaca961e285ebcd9a4e5476c04759a8548e64cbb4a8b2590d9cdbce7dcf51bb752dbf85e31ab083e1621d5a4d7e9e30bea0e9e8032cc40105bc1c99a4a4e520f4b62203c1c112514c75707ec47410b3e86425508e7e8141996caf390bb9bc361a3dfa05a464d39c39856f26877da1487d60e0706b1a024d88c59e608d7b0c8abae0d60303a6f83cc0cc6e99019e37900029f396be57e55fc4a40100e88c4ce8764cf2b90fbe00abf8bdd487de560ecddd3b2c541fa0856fc43683cea25d4c0e4d457480bcf09206c45a297db52e3b1fa963f0ef88f419af29cbcc1270f9f12306f9c94f38c4e8c8d2b00122e20aa8f238b9e58e85ddef20b821734f5759db670721807c8671dbec1afa168ac3502643e7e6fd12f61e66ff5adb65e2e248d6f5158defad2611f59008dc585002326b4dc2266de0de283e5b858053d8f615dc41ac70671b0037a12bce803d4bdbb0b1f080e1fee4ed513846df808a0ccfc8c27b7df61cfc2293c482ad7e5940a8e65d4b86b2f0978bbbdccd2cb32febb2e4cfae4eb096a5675c2a92b39fa7c703c15c814a3182dc4ad2d9d551c104a85c029ed5e9284a9085d633433", 0x1da, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0"], 0x1}}, 0x0) 03:35:25 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:25 executing program 3: 03:35:25 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:25 executing program 2: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xa2f1}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000020ff70)=[{0x0}], 0x1}, 0x0) 03:35:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0"], 0x1}}, 0x0) 03:35:25 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1ea, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:25 executing program 3: 03:35:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51"], 0x1}}, 0x0) 03:35:25 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:25 executing program 2: 03:35:25 executing program 3: 03:35:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51"], 0x1}}, 0x0) 03:35:26 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1ea, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:26 executing program 3: 03:35:26 executing program 2: 03:35:26 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51"], 0x1}}, 0x0) 03:35:26 executing program 3: 03:35:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf"], 0x1}}, 0x0) 03:35:26 executing program 2: 03:35:26 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:26 executing program 2: 03:35:26 executing program 3: 03:35:27 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:27 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(0x0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="2467cecf8eb1ab923e736b24f8b72cce31345d6c26464b0034641aad5d1d7ea8bc35541fa2dc8297ddb71df3da169a3e406ccaca961e285ebcd9a4e5476c04759a8548e64cbb4a8b2590d9cdbce7dcf51bb752dbf85e31ab083e1621d5a4d7e9e30bea0e9e8032cc40105bc1c99a4a4e520f4b62203c1c112514c75707ec47410b3e86425508e7e8141996caf390bb9bc361a3dfa05a464d39c39856f26877da1487d60e0706b1a024d88c59e608d7b0c8abae0d60303a6f83cc0cc6e99019e37900029f396be57e55fc4a40100e88c4ce8764cf2b90fbe00abf8bdd487de560ecddd3b2c541fa0856fc43683cea25d4c0e4d457480bcf09206c45a297db52e3b1fa963f0ef88f419af29cbcc1270f9f12306f9c94f38c4e8c8d2b00122e20aa8f238b9e58e85ddef20b821734f5759db670721807c8671dbec1afa168ac3502643e7e6fd12f61e66ff5adb65e2e248d6f5158defad2611f59008dc585002326b4dc2266de0de283e5b858053d8f615dc41ac70671b0037a12bce803d4bdbb0b1f080e1fee4ed513846df808a0ccfc8c27b7df61cfc2293c482ad7e5940a8e65d4b86b2f0978bbbdccd2cb32febb2e4cfae4eb096a5675c2a92b39fa7c703c15c814a3182dc4ad2d9d551c104a85c029ed5e9284a9085d633433f76ddd5f03f107dc399a7e7c7c16e686", 0x1ea, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf"], 0x1}}, 0x0) 03:35:27 executing program 2: 03:35:27 executing program 3: 03:35:27 executing program 2: 03:35:27 executing program 3: 03:35:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf"], 0x1}}, 0x0) 03:35:27 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(0x0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:27 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f2, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:27 executing program 2: 03:35:28 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:28 executing program 3: 03:35:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf68"], 0x1}}, 0x0) 03:35:28 executing program 2: 03:35:28 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(0x0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f2, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:28 executing program 3: 03:35:28 executing program 2: 03:35:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf68"], 0x1}}, 0x0) 03:35:28 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:28 executing program 2: 03:35:28 executing program 3: 03:35:28 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:28 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f2, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000190045000080000000000000010000000c000600017c3501e6f44fc3146596b10599798dd8c4bb1685de443406bcd1b6ada31b8481105b91501dfffd4eb1be2a69c5f2c1a2a1e1017e1f7f29933d660e520fc17495982cf59533b72a20ff3e637db5f69b777d7a3048baaff30e7bec95e7c1ae87eaff1ca97dfc351c24b697a9b4b3dbf0b16c1acc51f1bf68"], 0x1}}, 0x0) 03:35:28 executing program 2: 03:35:28 executing program 3: 03:35:28 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:28 executing program 3: 03:35:28 executing program 2: 03:35:29 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:29 executing program 1: 03:35:29 executing program 3: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon0\x00', 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000280)) 03:35:29 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x0) 03:35:29 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 03:35:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f6, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:29 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 03:35:29 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 03:35:29 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140), 0x50, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:29 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 03:35:29 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(0x0, 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:29 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 03:35:29 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, 0x0, 0x0, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = inotify_init() dup3(r0, r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 03:35:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f6, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:29 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) 03:35:29 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 03:35:29 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(0x0, 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:29 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, 0x0, 0x0, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:29 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x143046, 0x0) open(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 03:35:29 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x143046, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffffffffffff7d) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) 03:35:29 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 03:35:29 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(0x0, 0x141042, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:29 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="2467cecf8eb1ab923e736b24f8b72cce31345d6c26464b0034641aad5d1d7ea8bc35541fa2dc8297ddb71df3da169a3e406ccaca961e285ebcd9a4e5476c04759a8548e64cbb4a8b2590d9cdbce7dcf51bb752dbf85e31ab083e1621d5a4d7e9e30bea0e9e8032cc40105bc1c99a4a4e520f4b62203c1c112514c75707ec47410b3e86425508e7e8141996caf390bb9bc361a3dfa05a464d39c39856f26877da1487d60e0706b1a024d88c59e608d7b0c8abae0d60303a6f83cc0cc6e99019e37900029f396be57e55fc4a40100e88c4ce8764cf2b90fbe00abf8bdd487de560ecddd3b2c541fa0856fc43683cea25d4c0e4d457480bcf09206c45a297db52e3b1fa963f0ef88f419af29cbcc1270f9f12306f9c94f38c4e8c8d2b00122e20aa8f238b9e58e85ddef20b821734f5759db670721807c8671dbec1afa168ac3502643e7e6fd12f61e66ff5adb65e2e248d6f5158defad2611f59008dc585002326b4dc2266de0de283e5b858053d8f615dc41ac70671b0037a12bce803d4bdbb0b1f080e1fee4ed513846df808a0ccfc8c27b7df61cfc2293c482ad7e5940a8e65d4b86b2f0978bbbdccd2cb32febb2e4cfae4eb096a5675c2a92b39fa7c703c15c814a3182dc4ad2d9d551c104a85c029ed5e9284a9085d633433f76ddd5f03f107dc399a7e7c7c16e686f51ed4b4124a433f56596d38", 0x1f6, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:29 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, 0x0, 0x0, 0x2, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:30 executing program 2: pipe2(0x0, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) 03:35:30 executing program 3: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:35:30 executing program 1: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 03:35:30 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:30 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:30 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) chroot(0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 03:35:30 executing program 3: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 381.012590][ T26] audit: type=1804 audit(2000000130.219:50): pid=18773 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir195614637/syzkaller.LqzrLs/643/file0/bus" dev="ramfs" ino=67137 res=1 03:35:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f8, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:30 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) connect$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) 03:35:30 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) 03:35:30 executing program 3: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:35:30 executing program 1: ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) 03:35:30 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000200)="10df6d019d91afa06928d9b680877f711336b671d0", 0x15}], 0x1) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) 03:35:30 executing program 3: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) [ 381.333713][ T26] audit: type=1804 audit(2000000130.539:51): pid=18794 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir195614637/syzkaller.LqzrLs/644/file0/bus" dev="ramfs" ino=67188 res=1 03:35:30 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f8, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:30 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x0) [ 381.626045][ T26] audit: type=1804 audit(2000000130.829:52): pid=18820 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir195614637/syzkaller.LqzrLs/645/file0/bus" dev="ramfs" ino=67220 res=1 03:35:31 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:31 executing program 2: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) 03:35:31 executing program 1: creat(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 03:35:31 executing program 3: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 03:35:31 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000240), 0x0) 03:35:31 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f8, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:31 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) 03:35:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') bind$netlink(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r0 = syz_open_dev$ndb(&(0x7f0000000240)='/dev/nbd#\x00', 0x0, 0x24281) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0xfff) creat(0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) 03:35:31 executing program 3: r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 03:35:31 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000240), 0x0) 03:35:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 03:35:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@dev}, 0x1f2) close(r0) 03:35:32 executing program 3: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:35:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:32 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000240), 0x0) 03:35:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@dev}, 0x1f2) close(r0) 03:35:32 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x50, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) 03:35:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) pipe(0x0) 03:35:32 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0), &(0x7f0000001940)=0x18) 03:35:32 executing program 3: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:35:32 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000240), 0x0) [ 382.990275][T18883] debugfs: File 'dropped' in directory 'loop0' already present! [ 383.017999][T18883] debugfs: File 'msg' in directory 'loop0' already present! [ 383.031745][T18883] debugfs: File 'trace0' in directory 'loop0' already present! 03:35:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) mremap(&(0x7f0000282000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000268000/0x2000)=nil) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) 03:35:32 executing program 3: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:35:32 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000240), 0x0) 03:35:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x6, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) 03:35:32 executing program 3: r0 = socket(0x2, 0x802, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000af3ff0)={0x2, 0x4e20, @loopback}, 0x10) 03:35:32 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x0, 0x2, 0x0) 03:35:32 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000240), 0x0) 03:35:32 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x8000) 03:35:32 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @igmp={0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}}}}}, 0x0) 03:35:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x101001, 0x0) write$evdev(r0, &(0x7f0000000040), 0xff5d) 03:35:33 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001340)) r2 = socket$inet(0x2, 0x3, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setresuid(r3, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r4, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r4, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r4, 0x400000000000001) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001400)) geteuid() getgid() r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r5, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r5, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r5, 0x400000000000001) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r6, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r6, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r6, 0x400000000000001) openat$autofs(0xffffffffffffff9c, &(0x7f0000003540)='/dev/autofs\x00', 0x200, 0x0) r7 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000000c0)=ANY=[], 0xa536b678) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000003580)) r8 = socket$inet(0x2, 0x3, 0x2) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setresuid(r9, 0x0, 0x0) getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000035c0)) r10 = socket$inet(0x2, 0x3, 0x2) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setresuid(r11, 0x0, 0x0) r12 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(r13, 0xffffffffffffffff) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r14, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r14, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r14, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r14, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r14, 0x400000000000001) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003600)=0xffffffffffffffff, 0x4) r15 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r15, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r15, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r15, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r15, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r15, 0x400000000000001) r16 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r16, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r16, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) 03:35:33 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, 0x0, 0x0) 03:35:33 executing program 1: 03:35:33 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) 03:35:33 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x0, 0x2, 0x0) 03:35:33 executing program 2: 03:35:33 executing program 4: 03:35:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x8000) 03:35:33 executing program 4: 03:35:33 executing program 2: 03:35:33 executing program 1: 03:35:33 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000180)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000ee9ff0), 0x10) recvmmsg(r0, &(0x7f0000000140), 0x0, 0x2, 0x0) 03:35:33 executing program 4: 03:35:33 executing program 1: 03:35:33 executing program 4: 03:35:33 executing program 3: 03:35:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="2467cecf8eb1ab923e736b24f8b72cce31345d6c26464b0034641aad5d1d7ea8bc35541fa2dc8297ddb71df3da169a3e406ccaca961e285ebcd9a4e5476c04759a8548e64cbb4a8b2590d9cdbce7dcf51bb752dbf85e31ab083e1621d5a4d7e9e30bea0e9e8032cc40105bc1c99a4a4e520f4b62203c1c112514c75707ec47410b3e86425508e7e8141996caf390bb9bc361a3dfa05a464d39c39856f26877da1487d60e0706b1a024d88c59e608d7b0c8abae0d60303a6f83cc0cc6e99019e37900029f396be57e55fc4a40100e88c4ce8764cf2b90fbe00abf8bdd487de560ecddd3b2c541fa0856fc43683cea25d4c0e4d457480bcf09206c45a297db52e3b1fa963f0ef88f419af29cbcc1270f9f12306f9c94f38c4e8c8d2b00122e20aa8f238b9e58e85ddef20b821734f5759db670721807c8671dbec1afa168ac3502643e7e6fd12f61e66ff5adb65e2e248d6f5158defad2611f59008dc585002326b4dc2266de0de283e5b858053d8f615dc41ac70671b0037a12bce803d4bdbb0b1f080e1fee4ed513846df808a0ccfc8c27b7df61cfc2293c482ad7e5940a8e65d4b86b2f0978bbbdccd2cb32febb2e4cfae4eb096a5675c2a92b39fa7c703c15c814a3182dc4ad2d9d551c104a85c029ed5e9284a9085d633433f76ddd5f03f107dc399a7e7c7c16e686f51ed4b4124a433f56596d38c2f8c2", 0x1f9, 0x7}], 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x8000) 03:35:33 executing program 0: 03:35:33 executing program 2: 03:35:33 executing program 4: 03:35:33 executing program 1: 03:35:33 executing program 0: 03:35:33 executing program 2: 03:35:33 executing program 3: 03:35:33 executing program 1: 03:35:33 executing program 4: 03:35:33 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x8000) 03:35:33 executing program 2: 03:35:33 executing program 3: 03:35:33 executing program 1: 03:35:34 executing program 0: 03:35:34 executing program 4: 03:35:34 executing program 2: 03:35:34 executing program 4: 03:35:34 executing program 1: 03:35:34 executing program 3: 03:35:34 executing program 1: 03:35:34 executing program 0: 03:35:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="2467cecf8eb1ab923e736b24f8b72cce31345d6c26464b0034641aad5d1d7ea8bc35541fa2dc8297ddb71df3da169a3e406ccaca961e285ebcd9a4e5476c04759a8548e64cbb4a8b2590d9cdbce7dcf51bb752dbf85e31ab083e1621d5a4d7e9e30bea0e9e8032cc40105bc1c99a4a4e520f4b62203c1c112514c75707ec47410b3e86425508e7e8141996caf390bb9bc361a3dfa05a464d39c39856f26877da1487d60e0706b1a024d88c59e608d7b0c8abae0d60303a6f83cc0cc6e99019e37900029f396be57e55fc4a40100e88c4ce8764cf2b90fbe00abf8bdd487de560ecddd3b2c541fa0856fc43683cea25d4c0e4d457480bcf09206c45a297db52e3b1fa963f0ef88f419af29cbcc1270f9f12306f9c94f38c4e8c8d2b00122e20aa8f238b9e58e85ddef20b821734f5759db670721807c8671dbec1afa168ac3502643e7e6fd12f61e66ff5adb65e2e248d6f5158defad2611f59008dc585002326b4dc2266de0de283e5b858053d8f615dc41ac70671b0037a12bce803d4bdbb0b1f080e1fee4ed513846df808a0ccfc8c27b7df61cfc2293c482ad7e5940a8e65d4b86b2f0978bbbdccd2cb32febb2e4cfae4eb096a5675c2a92b39fa7c703c15c814a3182dc4ad2d9d551c104a85c029ed5e9284a9085d633433f76ddd5f03f107dc399a7e7c7c16e686f51ed4b4124a433f56596d38c2f8c2", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8000) 03:35:34 executing program 4: 03:35:34 executing program 3: 03:35:34 executing program 1: 03:35:34 executing program 2: 03:35:34 executing program 4: 03:35:34 executing program 1: 03:35:34 executing program 0: 03:35:34 executing program 3: 03:35:34 executing program 2: 03:35:34 executing program 4: 03:35:34 executing program 1: 03:35:34 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8000) 03:35:34 executing program 3: 03:35:34 executing program 0: 03:35:34 executing program 2: 03:35:34 executing program 1: 03:35:34 executing program 3: 03:35:34 executing program 4: 03:35:34 executing program 1: 03:35:34 executing program 2: 03:35:34 executing program 4: 03:35:34 executing program 0: 03:35:34 executing program 3: 03:35:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8000) 03:35:35 executing program 1: 03:35:35 executing program 0: 03:35:35 executing program 2: 03:35:35 executing program 3: 03:35:35 executing program 4: 03:35:35 executing program 1: 03:35:35 executing program 1: 03:35:35 executing program 3: 03:35:35 executing program 4: 03:35:35 executing program 2: 03:35:35 executing program 0: 03:35:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x0) 03:35:35 executing program 1: 03:35:35 executing program 4: 03:35:35 executing program 3: 03:35:35 executing program 2: 03:35:35 executing program 1: 03:35:35 executing program 4: 03:35:35 executing program 3: 03:35:35 executing program 0: 03:35:35 executing program 2: 03:35:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 03:35:35 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x3f) r1 = memfd_create(&(0x7f0000003ff7)='cgroupK\\\x00', 0x0) write(r1, &(0x7f0000000080)="d3ddb831b2de19b5ca00bf296c64e14f", 0x10) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000001fb0)={@ipv4={[], [], @broadcast}, @ipv4={[], [], @dev}, @loopback}) 03:35:35 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x0) 03:35:35 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:35 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:35 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:35:35 executing program 0: 03:35:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0x0, "9ec23bee3f97f0a7e56a0a48890c173dd6a56c265ac7c8b9462087934bd63f2cb35b37d3fd927309cd354cccfcc9c642a16d40457f7d158339c2739ec36608f2c42477fa3b5cb867a8ce3d22d24ed3d0"}, 0xd8) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:35:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 03:35:35 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:35 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:36 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x3ff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x1800, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000780)="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", 0x1f9, 0x7}], 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x0) 03:35:36 executing program 0: r0 = memfd_create(&(0x7f0000000000)='[\x80\xf2\xfe\xff\xff\xff', 0x7) fcntl$addseals(r0, 0x409, 0x0) 03:35:36 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 03:35:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 03:35:36 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:36 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x20000010800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000240)={{}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:35:36 executing program 0: r0 = memfd_create(&(0x7f0000000000)='[\x80\xf2\xfe\xff\xff\xff', 0x7) fcntl$addseals(r0, 0x409, 0x0) 03:35:36 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x7ff, 0x125086) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x800002, 0x11, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x526987c9) read(r2, &(0x7f0000000840)=""/250, 0x258618e3) sendfile(r1, r0, 0x0, 0x80005) 03:35:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:36 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:36 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:36 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) [ 387.329681][ T26] audit: type=1804 audit(2000000136.539:53): pid=19228 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir195614637/syzkaller.LqzrLs/673/file0" dev="sda1" ino=17610 res=1 03:35:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:36 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) socket$inet6(0xa, 0x80006, 0x0) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:36 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:35:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) [ 388.123118][ T26] audit: type=1804 audit(2000000137.329:54): pid=19228 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir195614637/syzkaller.LqzrLs/673/file0" dev="sda1" ino=17610 res=1 03:35:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79, 0x0, [0x7]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:37 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000140)={[{0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:35:37 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:35:37 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) socket$inet6(0xa, 0x80006, 0x0) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:37 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 03:35:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:37 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) socket$inet6(0xa, 0x80006, 0x0) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 388.287757][T19288] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value [ 388.312353][T19286] pit: kvm: requested 5028 ns i8254 timer period limited to 200000 ns [ 388.397429][T19299] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:37 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 03:35:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:37 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:37 executing program 1: ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000140)={[{0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) prctl$PR_CAPBSET_DROP(0x18, 0x1b) listen(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) 03:35:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xa, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) ioprio_get$uid(0x3, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x101001, 0x0) write$evdev(r0, &(0x7f0000000040), 0xff5d) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) 03:35:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:37 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 388.663668][T19318] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:37 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 03:35:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) [ 388.798289][T19330] pit: kvm: requested 5028 ns i8254 timer period limited to 200000 ns 03:35:38 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:38 executing program 0: 03:35:38 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:35:38 executing program 5: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 03:35:38 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:38 executing program 1: [ 389.029952][T19348] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:38 executing program 0: 03:35:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:38 executing program 1: 03:35:38 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:35:38 executing program 5: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 03:35:38 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:38 executing program 0: 03:35:38 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:35:38 executing program 1: 03:35:38 executing program 5: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) [ 389.376422][T19371] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:38 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:38 executing program 0: 03:35:38 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:38 executing program 1: [ 389.673902][T19397] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:38 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:38 executing program 0: 03:35:38 executing program 1: 03:35:38 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:39 executing program 1: 03:35:39 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:39 executing program 0: 03:35:39 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:39 executing program 1: 03:35:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) [ 390.010720][T19424] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:39 executing program 0: 03:35:39 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:39 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:39 executing program 1: 03:35:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:39 executing program 0: 03:35:39 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:39 executing program 1: 03:35:39 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 03:35:39 executing program 1: 03:35:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:39 executing program 0: [ 390.411000][T19455] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:39 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 03:35:39 executing program 1: 03:35:39 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 03:35:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:39 executing program 1: 03:35:39 executing program 0: 03:35:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:39 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:35:39 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 03:35:39 executing program 1: [ 390.755997][T19483] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:40 executing program 0: 03:35:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:40 executing program 1: 03:35:40 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:35:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(0x0, 0x0, 0x0) 03:35:40 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:40 executing program 0: 03:35:40 executing program 1: [ 391.014635][T19506] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(0x0, 0x0, 0x0) 03:35:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:40 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 03:35:40 executing program 0: 03:35:40 executing program 1: 03:35:40 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 391.306484][T19528] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(0x0, 0x0, 0x0) 03:35:40 executing program 0: 03:35:40 executing program 1: 03:35:40 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 03:35:40 executing program 1: 03:35:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:40 executing program 0: 03:35:40 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:40 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 03:35:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000), 0x0, 0x0) 03:35:40 executing program 1: [ 391.660177][T19555] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:41 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000), 0x0, 0x0) 03:35:41 executing program 0: 03:35:41 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000cd9ff4)='/dev/rfkill\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) 03:35:41 executing program 1: 03:35:41 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:41 executing program 0: [ 391.930674][T19578] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000), 0x0, 0x0) 03:35:41 executing program 0: 03:35:41 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:41 executing program 1: 03:35:41 executing program 2: 03:35:41 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 03:35:41 executing program 0: 03:35:41 executing program 2: 03:35:41 executing program 1: 03:35:41 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 392.272695][T19605] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:41 executing program 0: 03:35:41 executing program 1: 03:35:41 executing program 2: 03:35:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) 03:35:41 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:41 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:41 executing program 0: 03:35:41 executing program 1: 03:35:41 executing program 0: 03:35:41 executing program 2: 03:35:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) poll(&(0x7f0000000000)=[{}], 0x1, 0x0) [ 392.627041][T19634] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:41 executing program 1: 03:35:41 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:41 executing program 2: 03:35:41 executing program 0: 03:35:41 executing program 5: 03:35:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:42 executing program 1: 03:35:42 executing program 2: 03:35:42 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:42 executing program 0: 03:35:42 executing program 5: 03:35:42 executing program 1: 03:35:42 executing program 2: [ 393.042357][T19661] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:42 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:42 executing program 0: 03:35:42 executing program 5: 03:35:42 executing program 1: 03:35:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:42 executing program 2: 03:35:42 executing program 1: 03:35:42 executing program 0: 03:35:42 executing program 5: 03:35:42 executing program 2: 03:35:42 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:42 executing program 1: [ 393.353595][T19685] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:42 executing program 0: 03:35:42 executing program 5: 03:35:42 executing program 2: 03:35:42 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:42 executing program 5: 03:35:42 executing program 1: 03:35:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:42 executing program 2: 03:35:42 executing program 0: 03:35:42 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:42 executing program 5: 03:35:42 executing program 1: 03:35:42 executing program 2: [ 393.713268][T19714] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:43 executing program 0: 03:35:43 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:43 executing program 5: 03:35:43 executing program 1: 03:35:43 executing program 2: 03:35:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:43 executing program 5: 03:35:43 executing program 0: 03:35:43 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:43 executing program 1: [ 394.059173][T19739] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:43 executing program 2: 03:35:43 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:43 executing program 5: 03:35:43 executing program 0: 03:35:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:43 executing program 2: 03:35:43 executing program 1: 03:35:43 executing program 5: 03:35:43 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 394.376567][T19762] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:43 executing program 0: 03:35:43 executing program 2: 03:35:43 executing program 1: 03:35:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:43 executing program 5: 03:35:43 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) 03:35:43 executing program 2: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:43 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) 03:35:43 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 394.645417][T19780] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:43 executing program 5: ioctl$TCSETX(0xffffffffffffffff, 0x5433, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) 03:35:43 executing program 0: socket(0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) write$tun(0xffffffffffffffff, 0x0, 0x0) 03:35:43 executing program 2: sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) 03:35:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:44 executing program 1: open(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) 03:35:44 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xa4) ioctl$EVIOCGVERSION(r0, 0x80044501, 0x0) [ 394.894748][T19809] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:44 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:44 executing program 1: socket(0x0, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 03:35:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) 03:35:44 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) 03:35:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:44 executing program 2: setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) 03:35:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @empty}}}, 0x108) [ 395.254473][T19843] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:44 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:44 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x60, r2, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r4}}}]}}]}, 0x60}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 03:35:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') readv(r0, &(0x7f0000001780)=[{&(0x7f0000000080)=""/27, 0x1b}], 0x1) 03:35:44 executing program 0: capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000000)) r0 = socket$nl_crypto(0x10, 0x3, 0x15) bind$netlink(r0, &(0x7f00000044c0)={0x10, 0x0, 0x0, 0x20800}, 0xc) 03:35:44 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') readv(r0, &(0x7f0000001780)=[{&(0x7f0000000080)=""/27, 0x1b}], 0x1) [ 395.445802][T19858] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 395.514349][T19869] netlink: 'syz-executor.5': attribute type 3 has an invalid length. [ 395.520795][T19864] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:44 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') readv(r0, &(0x7f0000001540)=[{&(0x7f00000001c0)=""/127, 0x7f}, {&(0x7f00000002c0)=""/247, 0xf7}], 0x2) 03:35:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) writev(r0, &(0x7f00006d6000)=[{&(0x7f0000bc7000)="e9", 0x1}], 0x1) writev(r0, &(0x7f0000f7ffe0)=[{&(0x7f0000513f59)="c5", 0x1}], 0x1) sendmsg(r0, &(0x7f0000ece000)={0x0, 0x0, &(0x7f00004a0fa0)=[{&(0x7f00007abf7e)="dd", 0x1}], 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) sendto$inet6(r0, &(0x7f0000db6000)="84b49a40a76c78f0769e4a395a78bbd1d97ece9e374f34257497eb3acfec4b7040bb4344183700596e81834a3af617296e8db16358ec9fb6f4c3c7f0e7947609533883b5d83e276617b5683f97a326e3f9315b6ef401c7f71e34055cd5a9fa8f2550c4d0b1901b79363cddd081b572b7ef2c178dc0d994a321ec103685fdb92bb2e74d37fd3e61116de31b6dd04377a7dd14711a5a3a981379e205277ac3aef4bf09b066d73729cede4dd4096d2f688428", 0xb1, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000b10fa2)='>', 0x1, 0x0, 0x0, 0x0) 03:35:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x200000002) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x77, 0x1, 0x4127}, 0xb) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="ff5b7213f6012f66b000000000e00200ffffffff816f00000000d7e81ad47102"], 0x20) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 03:35:45 executing program 1: r0 = memfd_create(&(0x7f0000000440)='/d\x04\x00\x00\x00\x00', 0x5) lseek(r0, 0x0, 0x2000000002) 03:35:45 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) socket$inet6(0xa, 0x80006, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 395.871055][T19895] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:45 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) socket$inet6(0xa, 0x80006, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:45 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000140)) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:35:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x200000002) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x77, 0x1, 0x4127}, 0xb) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="ff5b7213f6012f66b000000000e00200ffffffff816f00000000d7e81ad47102"], 0x20) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 03:35:45 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) socket$inet6(0xa, 0x80006, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 396.156667][T19918] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:45 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x200000002) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000100)={0xb, 0x77, 0x1, 0x4127}, 0xb) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="ff5b7213f6012f66b000000000e00200ffffffff816f00000000d7e81ad47102"], 0x20) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 03:35:45 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) [ 396.460929][T19947] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:45 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:46 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:46 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:46 executing program 2: perf_event_open(&(0x7f0000000b80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x345eec24, 0x4000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='&\x00', 0x5) 03:35:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 03:35:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:46 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000080), 0x0, 0x0) 03:35:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:46 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) shutdown(r0, 0x2732201e9e4e1c3b) 03:35:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) memfd_create(&(0x7f0000000040)='&\x00', 0x5) 03:35:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:46 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 03:35:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800a1695e1dcfe87b1071") fstat(r0, &(0x7f0000000180)) 03:35:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00*4\xa8gP\xd7\xe1\xb2\xdd\v\xc1$l\b\x00\x9d\x8d\x02\x0f\xa66\xb2XT\xf0\xf9\x96+\xd3\xe8\xd7') 03:35:46 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 03:35:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:46 executing program 2: perf_event_open(&(0x7f0000000b80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='&\x00', 0x5) 03:35:46 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f000000b600)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000100)="af", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000017c0)="05", 0x20000101}], 0x1}}], 0x2, 0xc0d0) 03:35:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:47 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 03:35:47 executing program 2: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 03:35:47 executing program 0: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f00000000c0)={':yz', 0x0}, &(0x7f0000000100)='GPLvboxnet0\x00', 0x0) 03:35:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:47 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, 0x0, 0x0, 0x0) 03:35:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:47 executing program 2: perf_event_open(&(0x7f0000000b80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='&\x00', 0x0) 03:35:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:47 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, 0x0, 0x0, 0x0) 03:35:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}], [{@subj_role={'subj_role'}}]}) 03:35:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:47 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x1) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, 0x0, 0x0, 0x0) 03:35:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) [ 398.631821][T20104] FAT-fs (loop4): bogus number of reserved sectors 03:35:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)="16", 0x1}]) 03:35:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0xe, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) [ 398.683310][T20104] FAT-fs (loop4): Can't find a valid FAT filesystem 03:35:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(0xffffffffffffffff, &(0x7f0000fc7ff8), 0xffc7) 03:35:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)="16", 0x1}]) 03:35:48 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 03:35:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) [ 399.010116][T20143] FAT-fs (loop4): bogus number of reserved sectors [ 399.043740][T20143] FAT-fs (loop4): Can't find a valid FAT filesystem 03:35:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)="16", 0x1}]) 03:35:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(0xffffffffffffffff, &(0x7f0000fc7ff8), 0xffc7) 03:35:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) [ 399.333894][T20167] FAT-fs (loop4): bogus number of reserved sectors [ 399.371069][T20167] FAT-fs (loop4): Can't find a valid FAT filesystem 03:35:48 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) memfd_create(&(0x7f0000000040)='&\x00', 0x0) 03:35:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[], [{@subj_role={'subj_role'}}]}) 03:35:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:48 executing program 3: r0 = memfd_create(&(0x7f0000000040)='&\x00', 0x5) perf_event_open(&(0x7f0000000b80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:35:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(0xffffffffffffffff, &(0x7f0000fc7ff8), 0xffc7) 03:35:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:48 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, 0x0, &(0x7f0000000000)) [ 399.651531][T20194] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:49 executing program 3: 03:35:49 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[], [{@subj_role={'subj_role'}}]}) 03:35:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:49 executing program 3: 03:35:49 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) [ 399.954516][T20224] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:49 executing program 3: 03:35:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[], [{@subj_role={'subj_role'}}]}) 03:35:49 executing program 0: close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:49 executing program 3: [ 400.241746][T20249] FAT-fs (loop4): Unrecognized mount option "subj_role=" or missing value 03:35:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:49 executing program 0: close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@fat=@check_normal='check=normal'}]}) 03:35:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:49 executing program 3: 03:35:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:49 executing program 3: 03:35:49 executing program 0: close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:49 executing program 2: socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, 0x0, &(0x7f0000000000)) [ 400.599190][T20276] FAT-fs (loop4): bogus number of reserved sectors [ 400.605877][T20276] FAT-fs (loop4): Can't find a valid FAT filesystem 03:35:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:50 executing program 3: 03:35:50 executing program 4: 03:35:50 executing program 2: socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:50 executing program 3: 03:35:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:50 executing program 4: 03:35:50 executing program 2: socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, 0x0, &(0x7f0000000000)) 03:35:50 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f000079a000)="16", 0x1}]) 03:35:50 executing program 3: 03:35:50 executing program 4: 03:35:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:50 executing program 4: 03:35:50 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f000079a000)="16", 0x1}]) 03:35:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000000)) 03:35:50 executing program 3: 03:35:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:50 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r0 = dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r0, &(0x7f0000fc7ff8), 0xffc7) 03:35:50 executing program 4: 03:35:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000000)) 03:35:50 executing program 3: 03:35:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000000)) 03:35:50 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f000079a000)="16", 0x1}]) 03:35:50 executing program 4: 03:35:50 executing program 3: 03:35:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:50 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r0 = dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r0, &(0x7f0000fc7ff8), 0xffc7) 03:35:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, 0x0) 03:35:50 executing program 4: 03:35:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:51 executing program 3: 03:35:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:51 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r0 = dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r0, &(0x7f0000fc7ff8), 0xffc7) 03:35:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, 0x0) 03:35:51 executing program 4: 03:35:51 executing program 3: 03:35:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:51 executing program 4: 03:35:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, 0x0) 03:35:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:51 executing program 3: 03:35:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:51 executing program 3: 03:35:51 executing program 4: 03:35:51 executing program 2: 03:35:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:51 executing program 3: 03:35:51 executing program 4: 03:35:51 executing program 3: 03:35:51 executing program 2: 03:35:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:51 executing program 4: 03:35:51 executing program 4: 03:35:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:51 executing program 3: 03:35:51 executing program 2: 03:35:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:52 executing program 4: 03:35:52 executing program 2: 03:35:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:52 executing program 3: 03:35:52 executing program 4: 03:35:52 executing program 2: 03:35:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:52 executing program 4: 03:35:52 executing program 3: 03:35:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:52 executing program 2: 03:35:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:52 executing program 4: 03:35:52 executing program 2: 03:35:52 executing program 3: 03:35:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:52 executing program 4: 03:35:52 executing program 4: 03:35:52 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) 03:35:52 executing program 3: socket(0x0, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 03:35:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, 0x0, &(0x7f00000000c0)) 03:35:52 executing program 4: open(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) 03:35:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:53 executing program 4: creat(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) 03:35:53 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) 03:35:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, 0x0, &(0x7f00000000c0)) 03:35:53 executing program 3: creat(0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:35:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:53 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 03:35:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:53 executing program 3: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_smc(0x2b, 0x1, 0x0) fstat(r0, 0x0) 03:35:53 executing program 4: creat(0x0, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 03:35:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, 0x0, &(0x7f00000000c0)) 03:35:53 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) 03:35:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:53 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x0) 03:35:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4), 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), 0x0) 03:35:53 executing program 2: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 03:35:53 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, 0x0) 03:35:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), 0x0) 03:35:53 executing program 3: eventfd2(0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) 03:35:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4), 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:53 executing program 4: flistxattr(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, 0x0) 03:35:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x9, &(0x7f0000000080), 0x0) 03:35:53 executing program 3: creat(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) bind$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) 03:35:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4), 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:54 executing program 4: socket(0x0, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) bind$isdn_base(0xffffffffffffffff, 0x0, 0x0) 03:35:54 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) 03:35:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008916, &(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 03:35:54 executing program 3: ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) 03:35:54 executing program 2: openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) 03:35:54 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open(0x0, 0x0, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, 0x0) 03:35:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:54 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) 03:35:54 executing program 0: creat(0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) 03:35:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4006, 0x4000000000000000) 03:35:54 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 03:35:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:35:54 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x98a2) close(r0) 03:35:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) 03:35:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x0, 0x1, 0x1}, 0x14}}, 0x0) 03:35:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:54 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 03:35:55 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002640)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x1, 0x0) 03:35:55 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x98a2) close(r0) 03:35:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a17b5e1dcfe87b1071") prctl$PR_SET_PDEATHSIG(0x22, 0x0) 03:35:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, 0x0, 0x0) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:55 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='sched\x00') 03:35:55 executing program 3: setgroups(0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0xee01]) 03:35:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ustat(0x5, 0x0) 03:35:55 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x98a2) close(r0) 03:35:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, 0x0, 0x0) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/softnet_stat\x00') mmap(&(0x7f0000ffd000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x0) 03:35:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/softnet_stat\x00') mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 03:35:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='\x00\x00\x00\x00\x00*4\xa8gP\xd7\xe1\xb2\xdd\v\xc1$l\b\x00\x9d\x8d\x02\x0f\xa66\xb2XT\xf0\xf9\x96+\xd3\xe8\xd7') 03:35:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, 0x0, 0x0) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setgroups(0x3, &(0x7f0000000180)=[0x0, 0x0, 0xee01]) 03:35:55 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x98a2) close(r0) 03:35:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a17b5e1dcfe87b1071") prctl$PR_SET_PDEATHSIG(0x27, 0x0) 03:35:55 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/softnet_stat\x00') 03:35:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x89114700, 0x0, 0x0, 0x0, 0x0) 03:35:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:55 executing program 2: close(0xffffffffffffffff) 03:35:55 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080)=0xfffff9d5, 0x4) 03:35:55 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) shutdown(r0, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 03:35:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x4c}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) 03:35:56 executing program 2: close(0xffffffffffffffff) 03:35:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="8500000007e903"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x74, &(0x7f0000000080), &(0x7f00000000c0)=0x2caaced14507c47f) [ 406.867516][T20771] Trying to set illegal importance in message 03:35:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:56 executing program 2: close(0xffffffffffffffff) 03:35:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x806}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f00000000c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd@\x00\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891c, &(0x7f0000000580)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00#\x06\x00\x00\x00\x00\x00\x00\x00D3A}\xe4\xac\xff\x82q\xc7J\xe2J\x06\x00\x00\x00\x00\xd9\xbc\x0e\x9a\xd5\t\f\xe2\x90G903\xd7\x8d\xa8\x9e@?\xe5\xb1\rQ-\v\xcb\xbf\xd6\\\bWN\x824\x06\xe9fL\x9b>\xdd\a\xba8\x1a{\x93\xbb\x02*5F\x8d*\xbb\xd9|\x03\x86&Ds\xd1`=\x04\'\xf7\xd7\xb3\xae3\x81\xdd\xf57\xd9Y=\xb6/\xe2g\xc7\xcd\x1d\xb3T9\xda\xc3\x80\xd4\x13\x9f\xbf\xc0\x82\xe2\xc7\xc8\x18w\xc163B\xdcW\xff\xaf\x00\x00\x00\x00J\x00*\x14\b\xeb\xc4\x8d\xb7\x81h/\x9d\xcf\x8cJ\xec\b\xdd&\xc7`\x86\xe5\xaf\xdeC\xcd\x9e\x01\xd4\x9b\x9b)\xf9=\xed\x15!+\xc4>V\x19!V\xaajPP\x00\xfa$Q\x82\x007Qu.\x9bm\xf9\x8ctEI\x94\xbf\xd9\xe4l\x1a&\x1ae\x02p\xd6J\xe5},V\xe9]\x96\xbc\r\x8a\xa5G\x84*\xdd\x14\xdc\xef\xc9\xber\xac;\xd2]\xd8\x9f\x96\xc5\x00\x00~\xb4\xd8LS\x8e\x84\x88\a\x92\xe1\xac\xf7\xd5\xe8\x84h\xf4v\x86\xe7+\xba\xe3F\x02 gEo\xf5M\x1c\xc9\xb3@\xd0}S\v\"G\xf8\x9f\x82(iuW{+\xef\x9cD\x9d9\xf6\xdf/.\xcep;\x04 \xe3r\x91\xbc\x17)\x1f') 03:35:56 executing program 2: r0 = syz_open_dev$midi(0x0, 0x2000000, 0x98a2) close(r0) 03:35:56 executing program 4: 03:35:56 executing program 0: 03:35:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:56 executing program 4: 03:35:56 executing program 2: r0 = syz_open_dev$midi(0x0, 0x2000000, 0x98a2) close(r0) 03:35:56 executing program 0: 03:35:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:56 executing program 4: 03:35:56 executing program 2: r0 = syz_open_dev$midi(0x0, 0x2000000, 0x98a2) close(r0) 03:35:56 executing program 3: 03:35:56 executing program 0: 03:35:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:56 executing program 4: 03:35:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced", 0xc) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:56 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x98a2) close(r0) 03:35:56 executing program 4: 03:35:57 executing program 0: 03:35:57 executing program 3: 03:35:57 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x98a2) close(r0) 03:35:57 executing program 4: 03:35:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:57 executing program 0: 03:35:57 executing program 4: 03:35:57 executing program 3: 03:35:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:57 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x98a2) close(r0) 03:35:57 executing program 4: 03:35:57 executing program 0: 03:35:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:57 executing program 3: 03:35:57 executing program 4: 03:35:57 executing program 0: 03:35:57 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x0) close(r0) 03:35:57 executing program 3: 03:35:57 executing program 4: 03:35:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54", 0xe) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:57 executing program 0: 03:35:57 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x0) close(r0) 03:35:57 executing program 3: 03:35:57 executing program 4: 03:35:57 executing program 0: 03:35:57 executing program 3: 03:35:57 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x0) close(r0) 03:35:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:58 executing program 4: 03:35:58 executing program 3: 03:35:58 executing program 0: 03:35:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:58 executing program 2: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x98a2) close(0xffffffffffffffff) 03:35:58 executing program 0: 03:35:58 executing program 4: 03:35:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:58 executing program 3: 03:35:58 executing program 4: 03:35:58 executing program 0: 03:35:58 executing program 2: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x98a2) close(0xffffffffffffffff) 03:35:58 executing program 3: 03:35:58 executing program 4: 03:35:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54db", 0xf) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:58 executing program 0: 03:35:58 executing program 3: 03:35:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:58 executing program 2: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2000000, 0x98a2) close(0xffffffffffffffff) 03:35:58 executing program 4: 03:35:58 executing program 3: 03:35:58 executing program 0: 03:35:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:58 executing program 2: 03:35:58 executing program 4: 03:35:58 executing program 3: 03:35:58 executing program 0: 03:35:59 executing program 4: 03:35:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:59 executing program 2: 03:35:59 executing program 3: 03:35:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:59 executing program 0: 03:35:59 executing program 4: 03:35:59 executing program 3: 03:35:59 executing program 2: 03:35:59 executing program 4: 03:35:59 executing program 0: 03:35:59 executing program 3: 03:35:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:59 executing program 2: 03:35:59 executing program 4: 03:35:59 executing program 0: 03:35:59 executing program 3: 03:35:59 executing program 4: 03:35:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x0, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:59 executing program 2: 03:35:59 executing program 3: 03:35:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:35:59 executing program 0: 03:35:59 executing program 4: 03:35:59 executing program 2: 03:35:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x0, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:35:59 executing program 3: 03:36:00 executing program 0: 03:36:00 executing program 2: 03:36:00 executing program 4: 03:36:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x0, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:36:00 executing program 3: 03:36:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:00 executing program 0: 03:36:00 executing program 4: 03:36:00 executing program 2: 03:36:00 executing program 3: 03:36:00 executing program 4: 03:36:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:36:00 executing program 3: 03:36:00 executing program 2: 03:36:00 executing program 0: 03:36:00 executing program 4: 03:36:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x0, 0x0}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:36:00 executing program 3: 03:36:00 executing program 2: 03:36:00 executing program 0: 03:36:00 executing program 4: 03:36:00 executing program 2: 03:36:00 executing program 0: 03:36:00 executing program 4: 03:36:00 executing program 3: 03:36:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:36:00 executing program 2: 03:36:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x0, 0x0}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:01 executing program 0: 03:36:01 executing program 3: 03:36:01 executing program 4: 03:36:01 executing program 2: 03:36:01 executing program 0: 03:36:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:36:01 executing program 4: 03:36:01 executing program 3: 03:36:01 executing program 2: 03:36:01 executing program 3: 03:36:01 executing program 0: 03:36:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x0, 0x0}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:01 executing program 4: 03:36:01 executing program 2: 03:36:01 executing program 0: 03:36:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:36:01 executing program 3: 03:36:01 executing program 4: 03:36:01 executing program 2: 03:36:01 executing program 0: 03:36:01 executing program 3: 03:36:01 executing program 4: 03:36:01 executing program 2: 03:36:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000100)}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 03:36:01 executing program 0: 03:36:01 executing program 4: 03:36:01 executing program 3: 03:36:01 executing program 2: 03:36:02 executing program 3: 03:36:02 executing program 4: 03:36:02 executing program 0: 03:36:02 executing program 2: 03:36:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x0, 0x0) 03:36:02 executing program 3: 03:36:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000100)}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:02 executing program 4: 03:36:02 executing program 0: 03:36:02 executing program 2: 03:36:02 executing program 3: 03:36:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x0, 0x0) 03:36:02 executing program 3: 03:36:02 executing program 4: 03:36:02 executing program 2: 03:36:02 executing program 0: 03:36:02 executing program 2: 03:36:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x0, 0x0) 03:36:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000100)}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:02 executing program 3: 03:36:02 executing program 4: 03:36:02 executing program 0: 03:36:02 executing program 2: 03:36:02 executing program 4: 03:36:02 executing program 3: 03:36:02 executing program 0: 03:36:02 executing program 2: 03:36:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x0, &(0x7f0000738000)) 03:36:02 executing program 4: 03:36:03 executing program 3: 03:36:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:03 executing program 0: 03:36:03 executing program 2: 03:36:03 executing program 4: 03:36:03 executing program 3: 03:36:03 executing program 2: 03:36:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x0, &(0x7f0000738000)) 03:36:03 executing program 0: 03:36:03 executing program 3: 03:36:03 executing program 4: 03:36:03 executing program 0: 03:36:03 executing program 2: 03:36:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:03 executing program 4: 03:36:03 executing program 3: 03:36:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x0, &(0x7f0000738000)) 03:36:03 executing program 2: 03:36:03 executing program 0: 03:36:03 executing program 3: 03:36:03 executing program 4: 03:36:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:03 executing program 3: 03:36:03 executing program 2: 03:36:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[0x0]) 03:36:03 executing program 0: 03:36:03 executing program 4: 03:36:03 executing program 0: 03:36:03 executing program 3: 03:36:03 executing program 4: 03:36:04 executing program 2: 03:36:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[0x0]) 03:36:04 executing program 4: 03:36:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:04 executing program 3: add_key(&(0x7f0000000b40)='id_resolver\x00', &(0x7f0000000b80)={'syz', 0x1}, &(0x7f0000000bc0)="92", 0x1, 0xfffffffffffffffd) 03:36:04 executing program 2: migrate_pages(0x0, 0x5, &(0x7f0000000040)=0xe, &(0x7f0000000080)=0x401) 03:36:04 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000040)=0x9) 03:36:04 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[0x0]) 03:36:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) 03:36:04 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, 0x0, 0x0) 03:36:04 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000040)=0x9) 03:36:04 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)="16", 0x1}]) 03:36:04 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000205fe9)='net\x00') unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 03:36:04 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:04 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:04 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)="16", 0x1}]) 03:36:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000fc7ff8), 0xffc7) 03:36:04 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) 03:36:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r1, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)="16", 0x1}]) 03:36:05 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:05 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:05 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(0xffffffffffffffff, &(0x7f0000fc7ff8), 0xffc7) 03:36:05 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:05 executing program 2: sendto(0xffffffffffffffff, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 03:36:05 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:05 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(0xffffffffffffffff, &(0x7f0000fc7ff8), 0xffc7) 03:36:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:05 executing program 2: sendto(0xffffffffffffffff, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:05 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:05 executing program 2: sendto(0xffffffffffffffff, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 03:36:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:05 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(0xffffffffffffffff, &(0x7f0000fc7ff8), 0xffc7) 03:36:05 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:05 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(0xffffffffffffffff, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:05 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:05 executing program 4: mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, 0x0, 0x0) 03:36:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 03:36:06 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:06 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(0xffffffffffffffff, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:06 executing program 4: mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, 0x0, 0x0) 03:36:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)}]) 03:36:06 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(0xffffffffffffffff, 0x0, 0x0, 0x41, 0x0, 0x0) 03:36:06 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:06 executing program 4: mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:06 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, 0x0, 0x0) 03:36:06 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:06 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)}]) 03:36:06 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:06 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:06 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000a40)={&(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000980)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000780)=[{0x0}], 0x1}}], 0x48}, 0x0) 03:36:06 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:06 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:06 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:06 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:06 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x40046103, 0x0) 03:36:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)}]) 03:36:06 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:06 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000d06000), 0x4) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) open$dir(0x0, 0x709000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) [ 417.785270][T21519] QAT: failed to copy from user. 03:36:07 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x40046103, 0x0) 03:36:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:07 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:07 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mmap$binder(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:36:07 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) [ 418.016569][T21538] QAT: failed to copy from user. 03:36:07 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) [ 418.051967][T21544] debugfs: File '21539' in directory 'proc' already present! [ 418.083377][T21544] debugfs: File '21539' in directory 'proc' already present! 03:36:07 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x40046103, 0x0) 03:36:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:07 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) [ 418.108684][T21544] debugfs: File '21539' in directory 'proc' already present! 03:36:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1a6dff0099"], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 418.234901][T21558] QAT: failed to copy from user. 03:36:07 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x40046103, 0x0) [ 418.391339][T21568] QAT: failed to copy from user. 03:36:07 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) 03:36:07 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:07 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:07 executing program 5: ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x40046103, 0x0) 03:36:07 executing program 5: ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x40046103, 0x0) 03:36:07 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 03:36:07 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:08 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x200400, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) 03:36:08 executing program 5: ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x40046103, 0x0) 03:36:08 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x104000, 0x0) 03:36:08 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) syz_open_procfs(0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 03:36:08 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x40046103, 0x0) 03:36:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:08 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:08 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x40046103, 0x0) 03:36:08 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x6c1da1b98d8a1b66}, 0x5) 03:36:08 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x104000, 0x0) 03:36:08 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x40046103, 0x0) 03:36:08 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:08 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x104000, 0x0) 03:36:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() 03:36:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) syz_open_procfs(0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 03:36:09 executing program 5: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x40046103, 0x0) 03:36:09 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) getitimer(0x0, 0x0) 03:36:09 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:09 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x104000, 0x0) 03:36:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:09 executing program 5: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x40046103, 0x0) 03:36:09 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x0, 0x0) 03:36:09 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:09 executing program 5: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x40046103, 0x0) 03:36:09 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:10 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000e4dff1)='/dev/sequencer\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000019ff4)) 03:36:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) syz_open_procfs(0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 03:36:10 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x0, 0x0) 03:36:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwritev(r0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000600)="1f", 0x1}], 0x2, 0x0) 03:36:10 executing program 3: setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:10 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:10 executing program 5: mknod$loop(&(0x7f0000000380)='./file0\x00', 0x0, 0x1) lsetxattr$security_capability(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='security.capability\x00', &(0x7f0000000740), 0xc, 0x0) 03:36:10 executing program 3: setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:10 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) close(0xffffffffffffffff) getitimer(0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') 03:36:10 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:10 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000345ff8)='./file0\x00', 0x0, 0x0, 0x0) 03:36:10 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:10 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:36:10 executing program 1: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000d36ff4)={0xfc147812c6696267}) timerfd_settime(r4, 0x1, &(0x7f0000005000)={{}, {0x0, 0x1c9c380}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000ca0000)={0x2001}) epoll_pwait(r2, &(0x7f0000a1efac)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000019000)) 03:36:10 executing program 3: setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="8ec8cae17c1802230e347e80ab413f0b6d864b03f988daa7d20f82c58f94235d00000000000000000000000000c372", @ANYRESDEC, @ANYRESHEX=0x0], 0x3) 03:36:10 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:10 executing program 5: r0 = inotify_init1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000180)=0x13b, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x9) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010f02000270f7f8", 0x16}], 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 03:36:10 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) close(0xffffffffffffffff) getitimer(0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') 03:36:11 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) 03:36:11 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) [ 421.960170][T21757] FAT-fs (loop5): Directory bread(block 3841) failed 03:36:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:36:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000100)) [ 422.055413][T21757] FAT-fs (loop5): Directory bread(block 3842) failed 03:36:11 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) [ 422.140488][T21757] FAT-fs (loop5): Directory bread(block 3843) failed 03:36:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$sock(r0, &(0x7f0000000f00)={0x0, 0x0, 0x0}, 0x1) 03:36:11 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000ce9ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000642fb4)={0x0, 0x0, 0x10001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfd]}) [ 422.206830][T21757] FAT-fs (loop5): Directory bread(block 3844) failed [ 422.242693][T21757] FAT-fs (loop5): Directory bread(block 3845) failed 03:36:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) [ 422.260881][T21757] FAT-fs (loop5): Directory bread(block 3846) failed [ 422.289124][T21757] FAT-fs (loop5): Directory bread(block 3847) failed [ 422.309034][T21757] FAT-fs (loop5): Directory bread(block 3848) failed [ 422.348171][T21757] FAT-fs (loop5): Directory bread(block 3849) failed [ 422.355114][T21757] FAT-fs (loop5): Directory bread(block 3850) failed 03:36:11 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:11 executing program 5: ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, 0x0) r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory/events\x00', 0x26e1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={0x0, {{0xa, 0x4e24, 0x0, @mcast1, 0x6}}, {{0xa, 0x0, 0x1, @ipv4={[], [], @multicast1}, 0x200}}}, 0x108) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:36:11 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) close(0xffffffffffffffff) getitimer(0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') 03:36:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:36:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) 03:36:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:11 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) [ 422.577695][T21813] device bond0 left promiscuous mode 03:36:11 executing program 4: r0 = socket(0x1e, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000454ff0)={0x0, 0x2710}, 0x10) [ 422.641504][T21813] device bond_slave_0 left promiscuous mode [ 422.681762][T21813] device bond_slave_1 left promiscuous mode 03:36:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x4, 0x0, 0xfffffffffffffffd) syz_open_procfs(0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) creat(0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 03:36:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) accept$unix(r0, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) stat(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6}}, {{@in6=@dev}}}, &(0x7f0000000bc0)=0xe8) 03:36:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:12 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000b7dff0)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) 03:36:12 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) close(0xffffffffffffffff) getitimer(0x0, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') 03:36:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:36:12 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="3800000024000705000000050000000000000018", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100686866000c0002000800010000000000"], 0x38}}, 0x0) 03:36:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) accept$unix(r0, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) stat(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6}}, {{@in6=@dev}}}, &(0x7f0000000bc0)=0xe8) 03:36:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) accept$unix(r0, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) stat(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6}}, {{@in6=@dev}}}, &(0x7f0000000bc0)=0xe8) 03:36:13 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:13 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 03:36:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:13 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) close(0xffffffffffffffff) getitimer(0x0, &(0x7f00000002c0)) 03:36:13 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) 03:36:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 03:36:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) stat(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6}}, {{@in6=@dev}}}, &(0x7f0000000bc0)=0xe8) 03:36:14 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x3, 0x0) 03:36:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:14 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) close(0xffffffffffffffff) 03:36:14 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x3bb) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000becf78)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 03:36:14 executing program 4: migrate_pages(0x0, 0x4, &(0x7f0000000000)=0xffffffff80000001, &(0x7f0000000040)=0x2) 03:36:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) stat(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6}}, {{@in6=@dev}}}, &(0x7f0000000bc0)=0xe8) 03:36:15 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:15 executing program 0: mknod(&(0x7f0000000200)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) 03:36:15 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) stat(0x0, &(0x7f0000000a40)) 03:36:15 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) 03:36:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) 03:36:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 03:36:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:17 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(0xffffffffffffffff, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x2000000000000001, 0xd2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x200, 0x89792e8c16ea01eb) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f0000000280)="b9", 0xb00, 0x0, 0x0, 0x30d) 03:36:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:18 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(0xffffffffffffffff, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:18 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000e99000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xb) 03:36:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) 03:36:18 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(0xffffffffffffffff, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:18 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00\x05H\x00L \x00\x00\nz\x03', 0xffb}) 03:36:18 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0x5) setuid(r2) 03:36:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) [ 429.904572][T22146] device bond0 entered promiscuous mode [ 429.953560][T22146] device bond_slave_0 entered promiscuous mode [ 429.992033][T22146] device bond_slave_1 entered promiscuous mode 03:36:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) [ 430.024264][T22146] 8021q: adding VLAN 0 to HW filter on device bond0 03:36:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000fdaff8), 0x8) 03:36:19 executing program 2: setitimer(0x1, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) [ 430.523806][T22142] device bond0 left promiscuous mode [ 430.529892][T22142] device bond_slave_0 left promiscuous mode [ 430.536130][T22142] device bond_slave_1 left promiscuous mode 03:36:19 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000001740)=[{0x0, 0x0, 0x100000001}]) 03:36:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) read(r0, &(0x7f0000000000)=""/126, 0x7e) ioctl$FIONREAD(r0, 0x541b, 0x0) dup2(r0, r2) 03:36:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) accept$unix(r0, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) sendmsg$key(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={0x0}}, 0x0) [ 437.238993][T22539] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 03:36:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:26 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 03:36:26 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000011000/0x2000)=nil, 0x2000}) [ 437.301296][T22540] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 03:36:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001340)) r2 = socket$inet(0x2, 0x3, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setresuid(r3, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r4, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r4, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r4, 0x400000000000001) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001400)) geteuid() getgid() r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r5, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r5, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r5, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r5, 0x400000000000001) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r6, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r6, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r6, 0x400000000000001) openat$autofs(0xffffffffffffff9c, &(0x7f0000003540)='/dev/autofs\x00', 0x200, 0x0) r7 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_elf64(r7, &(0x7f00000000c0)=ANY=[], 0xa536b678) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000003580)) r8 = socket$inet(0x2, 0x3, 0x2) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setresuid(r9, 0x0, 0x0) getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000035c0)) r10 = socket$inet(0x2, 0x3, 0x2) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setresuid(r11, 0x0, 0x0) r12 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(r13, 0xffffffffffffffff) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r14, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r14, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r14, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r14, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r14, 0x400000000000001) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003600)=0xffffffffffffffff, 0x4) r15 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r15, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r15, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r15, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r15, 0x400000000000001) r16 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r16, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r16, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r16, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r16, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r16, 0x400000000000001) openat$random(0xffffffffffffff9c, &(0x7f0000003640)='/dev/urandom\x00', 0x1, 0x0) r17 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r17, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r17, 0x6, 0x19, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r17, 0x0, 0x14a, 0x200c0854, &(0x7f0000000000)={0x2, 0x200000004e23, @local}, 0x10) sendto$inet(r17, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 03:36:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 03:36:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:26 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 03:36:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:27 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:27 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 03:36:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:27 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 03:36:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:27 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 03:36:27 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:27 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 03:36:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={0x0, 0xffffff2c, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000030707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:36:28 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0), 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="05dea50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r2, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 03:36:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, 0x0, 0x0) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x19}, 0x3c) 03:36:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:29 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, 0x0, 0x0) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:29 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 03:36:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:29 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(0xffffffffffffffff, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:29 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0), 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) 03:36:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sync_file_range(r0, 0x0, 0x1, 0x0) 03:36:30 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(0xffffffffffffffff, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0), 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:31 executing program 5: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x0) 03:36:31 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(0xffffffffffffffff, &(0x7f0000000280), 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:31 executing program 5: prctl$PR_SET_MM(0x59616d61, 0x4, &(0x7f0000ffc000/0x3000)=nil) 03:36:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:32 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:32 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:32 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x400000000000150, 0x0) 03:36:32 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 03:36:32 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 03:36:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:33 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:33 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:33 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280), 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 03:36:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:33 executing program 4: add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='a', 0x1, 0xffffffffffffffff) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x80800) 03:36:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x11) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(0xffffffffffffffff, 0x0, 0xeb) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x15) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0xfffffffffffffe3f) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0xfffffffffffffe18) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000040)=0x1, 0x4) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x9fc1) ioctl(0xffffffffffffffff, 0xfffffffffffffffd, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0xffffffffffffffbc) connect$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe2a) bind$inet(r2, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000700)={0xfffffffffffffffd, 0x40000007fff, 0x7ffffffe}, 0x14) shutdown(r2, 0x2) 03:36:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:34 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:34 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:34 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 03:36:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:34 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:34 executing program 4: add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='a', 0x1, 0xffffffffffffffff) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x80800) 03:36:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:35 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:35 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:35 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:35 executing program 4: add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='a', 0x1, 0xffffffffffffffff) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x80800) 03:36:35 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:36 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:36 executing program 4: 03:36:36 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:36 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:36 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:36 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:36 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:36 executing program 4: 03:36:36 executing program 2: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:37 executing program 4: 03:36:37 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:37 executing program 2: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:37 executing program 4: 03:36:37 executing program 2: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:37 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:37 executing program 4: 03:36:37 executing program 2: r0 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:38 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:38 executing program 4: 03:36:38 executing program 2: r0 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:38 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x84, 0x1b, 0x0, &(0x7f00000000c0)=0x8300) 03:36:38 executing program 2: r0 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:38 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:38 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x84, 0x2, 0x0, &(0x7f00000000c0)=0x8300) 03:36:38 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:39 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:39 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:39 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x84, 0x1d, 0x0, &(0x7f00000000c0)=0x8300) 03:36:39 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:39 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:39 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x84, 0x1e, 0x0, &(0x7f00000000c0)=0x8300) 03:36:39 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:39 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 03:36:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:39 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x84, 0x75, 0x0, &(0x7f00000000c0)=0x8300) [ 450.259643][T23225] binder: 23223:23225 ioctl c0306201 0 returned -14 03:36:39 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) accept$unix(r0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:39 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x84, 0x74, 0x0, &(0x7f00000000c0)=0x8300) 03:36:39 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 03:36:40 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="680202004000010024000100"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:40 executing program 4: [ 450.797075][T23241] binder: 23236:23241 ioctl c0306201 0 returned -14 03:36:40 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="680202004000010024000100"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:40 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 03:36:40 executing program 4: 03:36:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:40 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="680202004000010024000100"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:40 executing program 4: [ 451.104882][T23260] binder: 23258:23260 ioctl c0306201 0 returned -14 03:36:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:40 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:40 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:40 executing program 4: 03:36:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 03:36:40 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:41 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:41 executing program 4: open(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffffffffffff7d) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 03:36:41 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:41 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:41 executing program 4: 03:36:41 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f73"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:41 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:41 executing program 4: 03:36:41 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f73"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:41 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:42 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f73"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:42 executing program 4: 03:36:42 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:42 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:42 executing program 4: 03:36:42 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f7374"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:42 executing program 4: 03:36:42 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f7374"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:42 executing program 4: 03:36:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:43 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:43 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f7374"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:43 executing program 4: 03:36:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) accept$unix(r0, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:43 executing program 4: 03:36:43 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:43 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:43 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:43 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x76, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c09851"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:43 executing program 4: [ 454.511141][T23397] binder: 23396:23397 unknown command 1850775417 [ 454.517958][T23397] binder: 23396:23397 ioctl c0306201 200000c0 returned -22 03:36:43 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:43 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x76, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c09851"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:43 executing program 4: 03:36:43 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 454.758376][T23406] binder: 23402:23406 unknown command 1850775417 [ 454.787327][T23406] binder: 23402:23406 ioctl c0306201 200000c0 returned -22 03:36:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:44 executing program 4: 03:36:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:44 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:44 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x76, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c09851"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:44 executing program 4: 03:36:44 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 455.226658][T23419] binder: 23417:23419 unknown command 1850775417 [ 455.252328][T23419] binder: 23417:23419 ioctl c0306201 200000c0 returned -22 03:36:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x17, 0x0, 0x0) 03:36:44 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:44 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xb1, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:44 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000354000), 0x389) write$eventfd(r0, &(0x7f0000951ff8), 0x8) write$eventfd(r0, &(0x7f0000f1aff8)=0x6, 0x8) 03:36:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 455.664119][T23442] binder: 23438:23442 unknown command 1850775417 [ 455.684653][T23442] binder: 23438:23442 ioctl c0306201 200000c0 returned -22 03:36:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:45 executing program 1: accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:45 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:45 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xb1, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:45 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="dd049f77c54160ba22f49f714ca8", 0x0, 0x73b0}, 0x28) [ 456.153232][T23462] binder: 23456:23462 unknown command 1850775417 03:36:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:45 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 456.196326][T23462] binder: 23456:23462 ioctl c0306201 200000c0 returned -22 03:36:45 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xb1, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xaa92}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 03:36:45 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 456.398260][T23477] binder: 23472:23477 unknown command 1850775417 [ 456.414400][T23477] binder: 23472:23477 ioctl c0306201 200000c0 returned -22 03:36:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:46 executing program 1: accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:46 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xcf, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xaa92}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_acct\x00') r0 = getpid() tkill(r0, 0x9) 03:36:46 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 457.033211][T23497] binder: 23491:23497 unknown command 1850775417 03:36:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:46 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 457.084570][T23497] binder: 23491:23497 ioctl c0306201 200000c0 returned -22 03:36:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:46 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xcf, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:46 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:46 executing program 4: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000354000), 0x389) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$eventfd(r0, &(0x7f0000f1aff8)=0x6, 0x8) [ 457.398082][T23521] binder: 23514:23521 unknown command 1850775417 [ 457.427021][T23521] binder: 23514:23521 ioctl c0306201 200000c0 returned -22 03:36:46 executing program 1: accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:46 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:46 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xcf, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:46 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:36:46 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:46 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) unlinkat(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) [ 457.641258][T23538] binder: 23533:23538 unknown command 1850775417 [ 457.669233][T23538] binder: 23533:23538 ioctl c0306201 200000c0 returned -22 03:36:46 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xde, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb67"], 0x1, 0x0, &(0x7f00000003c0)='L'}) [ 457.874909][T23557] binder: 23556:23557 unknown command 1850775417 [ 457.893902][T23557] binder: 23556:23557 ioctl c0306201 200000c0 returned -22 03:36:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:47 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:47 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xde, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb67"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) unlinkat(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:47 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf25000000000800", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) [ 458.288684][T23567] binder: 23563:23567 unknown command 1850775417 [ 458.311627][T23567] binder: 23563:23567 ioctl c0306201 200000c0 returned -22 03:36:47 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xde, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb67"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:47 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf25000000000800", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) unlinkat(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) [ 458.520841][T23586] binder: 23583:23586 unknown command 1850775417 [ 458.555593][T23586] binder: 23583:23586 ioctl c0306201 200000c0 returned -22 03:36:47 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xe5, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4d"], 0x1, 0x0, &(0x7f00000003c0)='L'}) [ 458.694929][T23597] binder: 23596:23597 unknown command 1850775417 [ 458.706242][T23597] binder: 23596:23597 ioctl c0306201 200000c0 returned -22 03:36:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:48 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf25000000000800", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:48 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:48 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) unlinkat(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:48 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xe5, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4d"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:48 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xe5, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4d"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:48 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf2500000000080001", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 459.178725][T23607] binder: 23604:23607 unknown command 1850775417 [ 459.206771][T23607] binder: 23604:23607 ioctl c0306201 200000c0 returned -22 03:36:48 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) unlinkat(0xffffffffffffffff, 0x0, 0x0) 03:36:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) [ 459.376150][T23624] binder: 23619:23624 unknown command 1850775417 03:36:48 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf2500000000080001", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 459.424875][T23624] binder: 23619:23624 ioctl c0306201 200000c0 returned -22 03:36:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:49 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xe9, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:49 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf2500000000080001", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:49 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) [ 460.085521][T23645] binder: 23639:23645 unknown command 1850775417 [ 460.107486][T23645] binder: 23639:23645 ioctl c0306201 200000c0 returned -22 03:36:49 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xe9, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 460.292235][T23658] binder: 23657:23658 unknown command 1850775417 03:36:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) unlinkat(0xffffffffffffffff, 0x0, 0x0) 03:36:49 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) [ 460.337448][T23658] binder: 23657:23658 ioctl c0306201 200000c0 returned -22 03:36:49 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xe9, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:49 executing program 1: seccomp(0x1, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:49 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) [ 460.556561][T23679] binder: 23672:23679 unknown command 1850775417 [ 460.577997][T23679] binder: 23672:23679 ioctl c0306201 200000c0 returned -22 03:36:49 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:49 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xeb, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 460.780871][T23696] binder: 23695:23696 unknown command 1850775417 [ 460.824714][T23696] binder: 23695:23696 ioctl c0306201 200000c0 returned -22 03:36:50 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) unlinkat(0xffffffffffffffff, 0x0, 0x0) 03:36:50 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:50 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xeb, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x20, 0x0) 03:36:50 executing program 1: seccomp(0x1, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:50 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x4}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 461.449185][T23718] binder: 23708:23718 unknown command 1850775417 [ 461.455806][T23718] binder: 23708:23718 ioctl c0306201 200000c0 returned -22 03:36:50 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, 0x0, 0x0, 0x20, 0x0) 03:36:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:50 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xeb, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7"], 0x1, 0x0, &(0x7f00000003c0)='L'}) 03:36:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, 0x0, 0x0, 0x20, 0x0) [ 461.843600][T23741] binder: 23736:23741 unknown command 1850775417 [ 461.852424][T23741] binder: 23736:23741 ioctl c0306201 200000c0 returned -22 03:36:51 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:51 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:51 executing program 1: seccomp(0x1, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:51 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xec, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x0, 0x0, 0x0}) 03:36:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, 0x0, 0x0, 0x20, 0x0) 03:36:51 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100), 0x0, 0x20, 0x0) [ 462.389158][T23756] binder: 23749:23756 unknown command 1850775417 [ 462.395554][T23756] binder: 23749:23756 ioctl c0306201 200000c0 returned -22 03:36:51 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xec, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x0, 0x0, 0x0}) 03:36:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100), 0x0, 0x20, 0x0) 03:36:51 executing program 4: readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) 03:36:51 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:51 executing program 4: readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) 03:36:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:52 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xec, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x0, 0x0, 0x0}) 03:36:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100), 0x0, 0x20, 0x0) 03:36:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:52 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:52 executing program 4: readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) 03:36:52 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) [ 463.006445][T23800] binder: 23792:23800 unknown command 1850775417 [ 463.036893][T23800] binder: 23792:23800 ioctl c0306201 200000c0 returned -22 03:36:52 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xec, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x0, 0x0, &(0x7f00000003c0)}) 03:36:52 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:52 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a00", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 463.301172][T23819] binder: 23814:23819 unknown command 1850775417 [ 463.350976][T23819] binder: 23814:23819 ioctl c0306201 200000c0 returned -22 03:36:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:52 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a00", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:52 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:52 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xec, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x0, 0x0, &(0x7f00000003c0)}) 03:36:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:52 executing program 4: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:52 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a00", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 463.573702][T23838] binder: 23832:23838 unknown command 1850775417 [ 463.582482][T23838] binder: 23832:23838 ioctl c0306201 200000c0 returned -22 03:36:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) 03:36:53 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xec, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0563044000000000046304400000000006630440000000007997506ea39438033ada635f7cd4c9d1de50cf51e7a773b356e7348d3b19cbdc76ed97a6a08da8997815ea9e6d3b6a1d5a7c1cdf78337a6166cfd70cf41b6cb958e69b7dae4fe74a09c8e4db4c323ba219438b49c2f1736eb01b18c098512160aad1c0394bd4c9b785ea39e6f5b1f809658351bcb5f101899004e6a8542081ceec87f1a675538ce9264c7f128392c875c23507fc8a694ef2d13b127563b2da420a3df952f062dd3d46202a3466fa9a9c985dde3cc577a1fdf40687931bbc4303dbab0e28bb6757bc226d9bba4db1603de1a9c7e7"], 0x0, 0x0, &(0x7f00000003c0)}) 03:36:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:53 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:53 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 463.985655][T23858] binder: 23853:23858 unknown command 1850775417 [ 464.007615][T23858] binder: 23853:23858 ioctl c0306201 200000c0 returned -22 03:36:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000002140)=[{{0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000006c80)="a8822fd1d6d5e3c7968f5cdbda168a739dfcbab64f74a3ee5a3ff34694b4c009c671b2e7fea7c4e5136722abd12616a36e30045718487f022eb221236e30daa94ae1af15fd7f4f3c4f411ea6b04de91f5f3c33c39facb882a019187330f5a5b448aebf89c2d9971c5e60d8ec3f2d9b74dad7603cde034dbd531791fcd5f97f314de952804b848c95edb27331424c9148", 0x90}], 0x1}}], 0x1, 0x0) 03:36:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) 03:36:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:53 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:36:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x0, 0x0) 03:36:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) 03:36:53 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001fde), 0x4) 03:36:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) [ 464.483051][T23894] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 03:36:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x0, 0x0) 03:36:53 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001fde), 0x4) 03:36:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:54 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001fde), 0x4) [ 464.791482][T23896] device nr0 entered promiscuous mode 03:36:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f0000000000)=@isdn, 0x80, 0x0}}], 0x1, 0x0, 0x0) 03:36:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) [ 465.293350][T23896] device nr0 entered promiscuous mode 03:36:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) 03:36:54 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, 0x0, 0x0) 03:36:54 executing program 0: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f000066f000)='./file0\x00', 0x13) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/control\x00', 0x0) inotify_add_watch(r0, &(0x7f0000447000)='./file0/control\x00', 0x4000000) umount2(&(0x7f0000117000)='./file0\x00', 0x0) 03:36:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:54 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, 0x0, 0x0) 03:36:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180), 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) 03:36:55 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)={&(0x7f0000002000)=ANY=[@ANYBLOB="1c0a0000", @ANYRES16, @ANYBLOB="200f27bd7000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="6802020040000100240001006c625f706f72745f737461"], 0x5}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, 0x0, 0x0) 03:36:55 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180), 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x806}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f00000000c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd@\x00\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891c, &(0x7f0000000580)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00#\x06\x00\x00\x00\x00\x00\x00\x00D3A}\xe4\xac\xff\x82q\xc7J\xe2J\x06\x00\x00\x00\x00\xd9\xbc\x0e\x9a\xd5\t\f\xe2\x90G903\xd7\x8d\xa8\x9e@?\xe5\xb1\rQ-\v\xcb\xbf\xd6\\\bWN\x824\x06\xe9fL\x9b>\xdd\a\xba8\x1a{\x93\xbb\x02*5F\x8d*\xbb\xd9|\x03\x86&Ds\xd1`=\x04\'\xf7\xd7\xb3\xae3\x81\xdd\xf57\xd9Y=\xb6/\xe2g\xc7\xcd\x1d\xb3T9\xda\xc3\x80\xd4\x13\x9f\xbf\xc0\x82\xe2\xc7\xc8\x18w\xc163B\xdcW\xff\xaf\x00\x00\x00\x00J\x00*\x14\b\xeb\xc4\x8d\xb7\x81h/\x9d\xcf\x8cJ\xec\b\xdd&\xc7`\x86\xe5\xaf\xdeC\xcd\x9e\x01\xd4\x9b\x9b)\xf9=\xed\x15!+\xc4>V\x19!V\xaajPP\x00\xfa$Q\x82\x007Qu.\x9bm\xf9\x8ctEI\x94\xbf\xd9\xe4l\x1a&\x1ae\x02p\xd6J\xe5},V\xe9]\x96\xbc\r\x8a\xa5G\x84*\xdd\x14\xdc\xef\xc9\xber\xac;\xd2]\xd8\x9f\x96\xc5\x00\x00~\xb4\xd8LS\x8e\x84\x88\a\x92\xe1\xac\xf7\xd5\xe8\x84h\xf4v\x86\xe7+\xba\xe3F\x02 gEo\xf5M\x1c\xc9\xb3@\xd0}S\v\"G\xf8\x9f\x82(iuW{+\xef\x9cD\x9d9\xf6\xdf/.\xcep;\x04 \xe3r\x91\xbc\x17)\x1f') [ 466.242091][T23947] device nr0 entered promiscuous mode [ 466.331027][T23967] device nr0 entered promiscuous mode 03:36:55 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) timer_create(0x4, 0x0, 0x0) sysinfo(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000117000)='./file0\x00', 0x0) 03:36:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:55 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180), 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:55 executing program 0: r0 = socket$inet(0x15, 0x80005, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x114, 0x1d, &(0x7f000000f000)=@filter={'filter\x00', 0xe, 0x4, 0x278, 0xffffffff, 0x0, 0x98, 0x2a8, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, &(0x7f0000027000), {[{{@ip={@local={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "68a8bdd6cf63953904c33da84d357a733f6ba7f8856c27fc1f7b3f1e6387"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4) 03:36:56 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) timer_create(0x4, 0x0, 0x0) sysinfo(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000117000)='./file0\x00', 0x0) 03:36:56 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f00001f6000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000001340)='.', 0x1}], 0x1, &(0x7f00000000c0)=[@init={0x18}], 0x18}], 0x1, 0x0) 03:36:56 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{0x0}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x806}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f00000000c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd@\x00\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891c, &(0x7f0000000580)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00#\x06\x00\x00\x00\x00\x00\x00\x00D3A}\xe4\xac\xff\x82q\xc7J\xe2J\x06\x00\x00\x00\x00\xd9\xbc\x0e\x9a\xd5\t\f\xe2\x90G903\xd7\x8d\xa8\x9e@?\xe5\xb1\rQ-\v\xcb\xbf\xd6\\\bWN\x824\x06\xe9fL\x9b>\xdd\a\xba8\x1a{\x93\xbb\x02*5F\x8d*\xbb\xd9|\x03\x86&Ds\xd1`=\x04\'\xf7\xd7\xb3\xae3\x81\xdd\xf57\xd9Y=\xb6/\xe2g\xc7\xcd\x1d\xb3T9\xda\xc3\x80\xd4\x13\x9f\xbf\xc0\x82\xe2\xc7\xc8\x18w\xc163B\xdcW\xff\xaf\x00\x00\x00\x00J\x00*\x14\b\xeb\xc4\x8d\xb7\x81h/\x9d\xcf\x8cJ\xec\b\xdd&\xc7`\x86\xe5\xaf\xdeC\xcd\x9e\x01\xd4\x9b\x9b)\xf9=\xed\x15!+\xc4>V\x19!V\xaajPP\x00\xfa$Q\x82\x007Qu.\x9bm\xf9\x8ctEI\x94\xbf\xd9\xe4l\x1a&\x1ae\x02p\xd6J\xe5},V\xe9]\x96\xbc\r\x8a\xa5G\x84*\xdd\x14\xdc\xef\xc9\xber\xac;\xd2]\xd8\x9f\x96\xc5\x00\x00~\xb4\xd8LS\x8e\x84\x88\a\x92\xe1\xac\xf7\xd5\xe8\x84h\xf4v\x86\xe7+\xba\xe3F\x02 gEo\xf5M\x1c\xc9\xb3@\xd0}S\v\"G\xf8\x9f\x82(iuW{+\xef\x9cD\x9d9\xf6\xdf/.\xcep;\x04 \xe3r\x91\xbc\x17)\x1f') 03:36:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:56 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{0x0}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 03:36:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:56 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{0x0}], 0x1) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:36:56 executing program 5: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000117000)='./file0\x00', 0x0) 03:36:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:56 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) 03:36:56 executing program 5: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000117000)='./file0\x00', 0x0) 03:36:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:36:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:57 executing program 2: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x10a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:36:57 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000340), 0x0) socket(0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000005c0)=0x16c, 0x3e3) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0xd6, "a77760f5a764f5cc3c241d6900000002f0fa57917cb62a93987a938fdedfce7bbbfffec2d8a09c41fb233245f2605b9eebeb156b2818a16d0000007c340c0200000000000000b2127e36000000050a0d"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x8013, r3, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:57 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:36:57 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:57 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000340), 0x0) socket(0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000005c0)=0x16c, 0x3e3) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0xd6, "a77760f5a764f5cc3c241d6900000002f0fa57917cb62a93987a938fdedfce7bbbfffec2d8a09c41fb233245f2605b9eebeb156b2818a16d0000007c340c0200000000000000b2127e36000000050a0d"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x8013, r3, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:57 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) [ 468.187266][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 468.193128][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:36:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) [ 468.370704][ T26] audit: type=1326 audit(2000000217.579:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24087 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x0 03:36:57 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) 03:36:57 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:57 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000340), 0x0) socket(0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000005c0)=0x16c, 0x3e3) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0xd6, "a77760f5a764f5cc3c241d6900000002f0fa57917cb62a93987a938fdedfce7bbbfffec2d8a09c41fb233245f2605b9eebeb156b2818a16d0000007c340c0200000000000000b2127e36000000050a0d"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x8013, r3, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:57 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:36:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:58 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000340), 0x0) socket(0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000005c0)=0x16c, 0x3e3) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0xd6, "a77760f5a764f5cc3c241d6900000002f0fa57917cb62a93987a938fdedfce7bbbfffec2d8a09c41fb233245f2605b9eebeb156b2818a16d0000007c340c0200000000000000b2127e36000000050a0d"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x8013, r3, 0x0) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:58 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:36:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:58 executing program 5: socketpair$tipc(0x1e, 0x10000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00') 03:36:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) [ 469.147272][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 469.153891][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 469.214578][ T26] audit: type=1326 audit(2000000218.419:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24133 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x0 03:36:58 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/105, 0x69}], 0x1) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) 03:36:58 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 03:36:58 executing program 0: socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:58 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") [ 469.598732][T24142] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app [ 469.614612][T24142] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 03:36:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:58 executing program 0: socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) 03:36:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 469.707270][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 469.713155][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:36:59 executing program 0: socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18, 0x14, 0x1}, 0x18}}, 0x0) [ 469.787276][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 469.793164][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:36:59 executing program 5: 03:36:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, 0x0, 0x0) 03:36:59 executing program 5: 03:36:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) [ 470.070339][ T26] audit: type=1326 audit(2000000219.279:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=24174 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x0 03:36:59 executing program 5: 03:36:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, 0x0, 0x0) 03:36:59 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) socket$packet(0x11, 0x3, 0x300) 03:36:59 executing program 4: 03:36:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:36:59 executing program 5: 03:36:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, 0x0, 0x0) 03:36:59 executing program 4: 03:36:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') 03:36:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 03:37:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/ipc\x00') 03:37:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 03:37:00 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') close(r0) 03:37:00 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) socket$packet(0x11, 0x3, 0x300) 03:37:00 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/netlink\x00') close(r0) 03:37:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 03:37:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 03:37:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') close(r0) 03:37:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") syz_open_procfs$namespace(0x0, &(0x7f0000000100)='../pid_for_children\x00') 03:37:00 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) socket$packet(0x11, 0x3, 0x300) 03:37:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:37:00 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2b, &(0x7f0000000000), 0x4) 03:37:00 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x84, 0x7, 0x0, &(0x7f00000000c0)=0x8300) 03:37:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:37:01 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x84, 0x9, 0x0, &(0x7f00000000c0)=0x8300) 03:37:01 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socket$kcm(0xa, 0x0, 0x11) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6df8f56e, 0x99d8, 0x0, 0x7f, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xffff, 0x152fa2ad, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0070691f5aad11"], 0x7) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 472.153252][T24267] device nr0 entered promiscuous mode [ 472.341580][T24267] device nr0 entered promiscuous mode 03:37:01 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:37:01 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8914, &(0x7f0000000000)) 03:37:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:01 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:01 executing program 5: r0 = mq_open(&(0x7f0000112000)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x81, 0x0) 03:37:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18}, 0x18}}, 0x0) 03:37:01 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) 03:37:01 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18}, 0x18}}, 0x0) 03:37:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) setsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, 0x0) 03:37:02 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote, 0x3}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000800)="cf", 0x1}], 0x1}, 0x0) 03:37:02 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_newaddr={0x18}, 0x18}}, 0x0) 03:37:02 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) 03:37:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:02 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:02 executing program 0: sendto$packet(0xffffffffffffffff, &(0x7f0000000040)="5fe8", 0x2, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000f74fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000b61000)={0x0, 0xb}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000c9effc), 0x2f2) sendto$inet6(r0, &(0x7f0000856f71)='1', 0x1, 0x0, &(0x7f00004b0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write(r0, &(0x7f0000000cc0)="d110ba65b7f75f3d490ce4f580b9a8e466602500c4bedde7b95b8b1309ef6b0953fcd3d392874f04b07b56a0f888d8a4d40b540ea9b86b722de731a91bdae01b538a8d9485f86631ea498922a0fd20d4538d17dbd42108bd275832b7bae632cbbe0a13286e6656072157be8ffaafa255609908422c269f85154df3c31e242951ba6c684863edaee20fac0101661c5639b054b7e191482b62bbd11c0c27ffe2383014c470fd5a343f499e2fa752fbc9d846488cfa88683169972c9b2cba01fd1f3f0dc8dff269a4e6fa7b7c9c76ee026fd26683e2ca1c618052f0296aa25a31ab7b0900000000000000fb1dcdc5b96dfe571bac570bad40dde7dc0503419e9b2f8213e0ae46d5b4075b36275aa8af46960aedc633b9a97ef52b7e7e12e9a227d0c23369bccedc974a55af2d7790c2bf39837c1511ea5febaa61bd42dde9a4a403188163564309af92a02618a30007ffcb4a8a685665b631990b44329a7c7c13a65b075321fa60beaf72452f6e3d6cd2cfef46efb86ec4d814b5e973ba94fa786277d976921908ec861deed3778a46b544d381576e34e501fd82ce87e3f3873b826ade5dac485055c91d2aa6b04d4820705db77c41ccc5e7ffcab4b0efea4b4aecfe5a635401afdf583e5dcaae2e0f5c01f93052f0864074a8b18f3126ae4ae39565b4be459ae1fae8c2042cd46d7bc23091f16855f1d19153d74c3d892b4256dd74e6fe88ce2ea96beed8176e7cc0a06aed4f0673ad1c4719f781799e095317fdff6732281da438ca3f293ec6e26750eeb9b67382cc35c897cd56e5c1011e6e93a0a7d366d057642e8d0946ed29a88014dfe573adf460a74fdc9b9dc35ad91086b0425fb6a3ff3d7e01c5eb4361e373cc5bcb12ffe2191a3a864f1fd947c0cfa2c3d877087375546b55e1fb9339ce84b79b832ffe8c36d4b8c60aae58a59940d1670750d466d04b86a46e8404c8dac89946b27eb40677aefbd4e48ce219062b838626f398d4e63ebd59ae60923face4f5418789f3a9c42c4c017ceed77fc9c86a4194409f684f20a9b2f64d7de7fa374d47450771fc9dcc05cf2c2bb34fb4f245566165af2611daf207f39084f41b9c2501e087f0ff9840978904d26f79e0df77b52ff8dc51034194741def8c0cc3ea638349fc447e248aba6994e1201413cc4d4fccfab0082f8393eb24aa7a6f1ec5ae4cffde1410354b0a930d888cc4d75c94f58d2c4862fcbbde7637444d09f0e3fd4ce3fb0934982abbfd14ae8d6b31a5a736179aee972c6fc968fddfe29881434bb7d4c3d6f31ed611ad33caa0373de6051adbc639ad1ed6fad06a0bb65871e4cb3abe6c060500dc8fb83fea00176f35d0ed68acdf73b5eaf32b4322f8b4e8f671733f94b870e99b283014435a0aa223bd6bd3a192df2fe11a207906358dc49d49c2b0c826a165d2ef3196e9d5b86a6515aaf38e57c7c5bbf7ab7f7974d4c012aac2982e2b9725db8fa2f6dddccfe119f78855e136cf58d69d623732e1cc7bd910caa6b53951fab4d1c69acc3a6fa1289f22c8e4de3f67e78fe63e015de345a5bdb5a5becb415c06cfd0744fedd04c91abacd4cd0dbe7c2323220189482c2fc5ac9a683b48907bf33d571540986506f04a2f74019f41fed754fac3f616de59ea5c1ab9e4cfb72efac5af29fffd502b21ea1e1ea41a3a22abe0589b5c737bb851c6eb8d89bb99556eb3966e2d658f68f7940d99740f05437edd54a3824be48b3b919c00688ff88df070434a1c69b9848ab94aea47082dc554f1092ca77d298e59a8419ad22dc8b4e8a725cfd1abcece95045012842ff6eced765daa9bb1b08103abc829a895cf75c090db3761927aff4398d0b5300311d6e3343d02881d88b3d65b7f11488afafba4d719510fb2ab94e61ba40a461e8972a467c71418b335a7ef70e5293ae07b0c6cb6bb12f15111d68afb1f1b54e4dc1c4e0dc360f844086d72928b33c4cca5fe13ad28f57103290ca77adb92458d4bd10f675b47a14d5b4f6a73932cb97fc4ccb841e8dbe40b29aaa73a291569ecfe3bc1e5e95aa46e1a16da6ee9fd32b550852d3fede027214bd74c465317d6ebb75533e4eadabb37557265447809a3a9a830fe7cf103dd95", 0x5dc) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 03:37:02 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:02 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:02 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0xc0045878, 0x0) 03:37:02 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0xc0045878, 0x0) 03:37:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 03:37:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:03 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0xc0045878, 0x0) 03:37:03 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:03 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) [ 473.947325][ C0] net_ratelimit: 8 callbacks suppressed [ 473.947333][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 473.958759][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delneigh={0x30, 0x1d, 0x819, 0x0, 0x0, {0xa}, [@NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @broadcast}}]}, 0x30}}, 0x0) 03:37:03 executing program 5: socket(0x40000000015, 0x805, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2715, 0x0, &(0x7f000033bffc)) 03:37:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:03 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:03 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:03 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:03 executing program 5: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0xffffffffffffffff, 0x1, 0x3}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 03:37:03 executing program 0: 03:37:03 executing program 3: capset(0x0, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) [ 474.427294][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 474.433128][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:37:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:03 executing program 0: 03:37:03 executing program 3: capset(0x0, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:03 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 03:37:03 executing program 0: getsockname$tipc(0xffffffffffffffff, 0x0, 0x0) 03:37:03 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$tipc(r0, 0x0, &(0x7f0000000040), 0x0) 03:37:04 executing program 3: capset(0x0, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:04 executing program 0: ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, 0x0) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, &(0x7f0000000000)=0xa0e) 03:37:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:37:04 executing program 3: capset(&(0x7f0000000040), &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:04 executing program 0: 03:37:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:37:04 executing program 3: capset(&(0x7f0000000040), &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:04 executing program 5: [ 475.227340][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 475.233470][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:04 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:04 executing program 0: 03:37:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:37:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:04 executing program 3: capset(&(0x7f0000000040), &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:04 executing program 5: 03:37:04 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:37:04 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:04 executing program 0: 03:37:04 executing program 5: 03:37:04 executing program 3: capset(&(0x7f0000000040)={0x20080522}, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:04 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:04 executing program 0: 03:37:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:05 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:37:05 executing program 5: 03:37:05 executing program 3: capset(&(0x7f0000000040)={0x20080522}, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:05 executing program 0: 03:37:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:05 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:37:05 executing program 5: 03:37:05 executing program 0: 03:37:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:05 executing program 3: capset(&(0x7f0000000040)={0x20080522}, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:05 executing program 5: 03:37:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:05 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:05 executing program 0: 03:37:05 executing program 5: 03:37:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:05 executing program 2: r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:05 executing program 0: 03:37:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:05 executing program 5: 03:37:05 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:05 executing program 0: 03:37:05 executing program 5: 03:37:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:06 executing program 0: 03:37:06 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) r0 = socket$kcm(0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, 0x0) 03:37:06 executing program 5: [ 476.907278][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 476.913114][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:06 executing program 2: r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:06 executing program 5: 03:37:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:06 executing program 0: 03:37:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:06 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0xc0045878, 0x0) 03:37:06 executing program 5: 03:37:06 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0xc0045878, 0x0) 03:37:06 executing program 0: [ 477.307299][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 477.313125][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:06 executing program 5: 03:37:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:06 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:06 executing program 0: 03:37:06 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0xc0045878, 0x0) 03:37:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:06 executing program 5: 03:37:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:06 executing program 0: 03:37:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:07 executing program 3: 03:37:07 executing program 5: 03:37:07 executing program 0: 03:37:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:07 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:07 executing program 3: 03:37:07 executing program 5: 03:37:07 executing program 0: 03:37:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r0, 0x0, 0x0) 03:37:07 executing program 0: 03:37:07 executing program 5: 03:37:07 executing program 3: 03:37:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:37:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:07 executing program 5: 03:37:07 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:07 executing program 3: 03:37:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:37:07 executing program 0: 03:37:07 executing program 5: 03:37:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:07 executing program 5: 03:37:07 executing program 0: 03:37:07 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x100000198) 03:37:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) write$cgroup_int(r0, 0x0, 0x0) 03:37:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:08 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, 0x0) [ 478.987288][ C0] net_ratelimit: 8 callbacks suppressed [ 478.987295][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 478.999509][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:08 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:08 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) 03:37:08 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, 0x0) 03:37:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) write$cgroup_int(r0, 0x0, 0x0) 03:37:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) write$cgroup_int(r0, 0x0, 0x0) 03:37:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:08 executing program 0: ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, 0x0) ioctl$void(0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) chmod(&(0x7f00000000c0)='./file0\x00', 0x20) 03:37:08 executing program 3: ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000000)={0x4, @vbi={0x3, 0x1, 0x40, 0x59555956, [0x0, 0x4], [0x1ff, 0x1], 0x6}}) 03:37:08 executing program 5: accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xe, 0x40000) socketpair(0x0, 0x0, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x800, 0x70bd2d, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) 03:37:08 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) write$cgroup_int(r0, 0x0, 0x0) 03:37:08 executing program 0: recvmmsg(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) 03:37:08 executing program 3: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) 03:37:08 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0xfffffffffffffede) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x8001, 0x6, 0x4}}) 03:37:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:37:08 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:09 executing program 0: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000180)={0x0, 0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f0000001e80)}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2280, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)) 03:37:09 executing program 5: syz_open_procfs(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, 0x0) 03:37:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:09 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:37:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:37:09 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x0, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:09 executing program 0: ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/130) 03:37:09 executing program 5: socket(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) 03:37:09 executing program 0: gettid() socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setgid(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0xfffffe23) 03:37:09 executing program 3: r0 = eventfd2(0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) write$eventfd(r0, &(0x7f0000951ff8), 0x8) 03:37:09 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x0, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:37:09 executing program 5: ioctl$sock_ifreq(0xffffffffffffffff, 0x54, &(0x7f0000000040)={'rose0\x00', @ifru_names='eql\x00'}) r0 = inotify_init1(0x0) ioctl$GIO_CMAP(r0, 0x4b70, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x628, 0x150000000000}) 03:37:09 executing program 3: recvmmsg(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, 0x0) 03:37:09 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x0, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:09 executing program 5: creat(0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0) 03:37:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff0700"/32, 0x20, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:09 executing program 0: gettid() tkill(0x0, 0x0) sched_getscheduler(0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) syz_open_dev$sndctrl(0x0, 0x0, 0x0) 03:37:09 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') writev(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, 0x0) 03:37:09 executing program 4: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) 03:37:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:09 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) 03:37:09 executing program 4: dup(0xffffffffffffffff) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:09 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, 0x0) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) 03:37:10 executing program 3: inotify_init1(0x1800) 03:37:10 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$setown(r0, 0xf, 0x0) 03:37:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:10 executing program 3: ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000080)={0x0, &(0x7f0000000040)=""/42, 0x2a}) 03:37:10 executing program 4: ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x1000c014) 03:37:10 executing program 0: socket(0x0, 0x0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) 03:37:10 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:10 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) 03:37:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/48, 0x30, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:10 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000000)) 03:37:10 executing program 3: recvmmsg(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, 0x0, 0x0) 03:37:10 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:10 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) 03:37:10 executing program 5: 03:37:10 executing program 3: 03:37:10 executing program 4: 03:37:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:10 executing program 5: 03:37:10 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:10 executing program 0: 03:37:10 executing program 3: 03:37:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:10 executing program 4: 03:37:10 executing program 0: 03:37:10 executing program 3: 03:37:10 executing program 5: 03:37:10 executing program 4: [ 481.627311][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 481.633222][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:10 executing program 5: 03:37:10 executing program 0: 03:37:10 executing program 3: 03:37:11 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/56, 0x38, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:11 executing program 4: 03:37:11 executing program 5: 03:37:11 executing program 3: 03:37:11 executing program 0: 03:37:11 executing program 3: 03:37:11 executing program 5: 03:37:11 executing program 0: 03:37:11 executing program 4: 03:37:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:11 executing program 5: [ 482.187285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 482.193153][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 482.267272][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 482.273156][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:11 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:11 executing program 3: 03:37:11 executing program 0: 03:37:11 executing program 5: 03:37:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:11 executing program 4: 03:37:11 executing program 5: 03:37:11 executing program 3: 03:37:11 executing program 0: 03:37:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') writev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 03:37:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/60, 0x3c, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:11 executing program 5: 03:37:11 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:11 executing program 0: 03:37:11 executing program 3: 03:37:11 executing program 5: 03:37:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:11 executing program 4: 03:37:12 executing program 4: 03:37:12 executing program 5: 03:37:12 executing program 3: 03:37:12 executing program 0: 03:37:12 executing program 5: 03:37:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:12 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:12 executing program 4: 03:37:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xa454a72f209dea1f) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r4}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @remote}, 0x10) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x42, &(0x7f00000001c0)=0x2, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x7fff) sendfile(r3, r5, 0x0, 0x8040fffffffd) 03:37:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8j#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8{\x82 \x8f\xbb\x83^T\xcc\x13\x10\xa3\xb4\x81\xd5\x03\xfa\xc8\rt)\t\xa6;|\xd1\xa1\x8d@^\x00\x00\x00\x00\x00\x00\x00\x81\xc13\xba\xf0\xc0\xddKc\xa3g!\x1c\x00x\x00\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce\x00'/272) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000003c0)="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", 0x321}, 0x0) setgroups(0x8ba, &(0x7f0000000180)) pread64(r0, 0x0, 0x0, 0x0) 03:37:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@norock='norock'}]}) 03:37:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200"/62, 0x3e, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:12 executing program 4: socket$inet(0x2, 0x6, 0x0) 03:37:12 executing program 5: creat(0xfffffffffffffffe, 0x0) 03:37:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:12 executing program 0: r0 = gettid() getrandom(&(0x7f0000000040), 0xc6e9f4ae45a117f1, 0x0) tkill(r0, 0x16) 03:37:12 executing program 4: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}, {0xe97f4c10ebda45c1}], 0x2) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) 03:37:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r0, r0, 0x0, 0x5) 03:37:12 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 03:37:12 executing program 4: r0 = memfd_create(&(0x7f0000000000)='-\x00', 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) fcntl$addseals(r1, 0x409, 0x4) write$P9_RSTATFS(r1, &(0x7f0000000040)={0x43}, 0x43) 03:37:12 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x11, &(0x7f0000000000)) 03:37:12 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0xa202, 0x0) write$sndseq(r0, &(0x7f0000789fd0)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x4}, {}, @raw8={"7a88d654f95067fe68d2359f"}}], 0x30) write$sndseq(r0, &(0x7f00006c3000)=[{0x40081, 0x4, 0x0, 0x0, @tick, {}, {}, @time}], 0x30) 03:37:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:12 executing program 3: clock_gettime(0xe543b710eb7b8680, 0x0) 03:37:12 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 483.707308][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 483.713263][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:15 executing program 0: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000240)="b156d417452c8f6d46edb3b1077f2abaa85e3489c66107abcc617d9aeb42aa515f23c9150bfdba5fa1be4e0415cb2c2d4a1cdff5", 0x34) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 03:37:15 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x3cc, 0x0, 0x0, 0x0, 0x1a8}}], 0x400000000000255, 0x0, 0x0) 03:37:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00\x05H\x00L \x00\x00\nz\x03', 0xffb}) 03:37:15 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:15 executing program 4: socket(0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) [ 486.490680][T25100] device bond0 entered promiscuous mode [ 486.527466][T25100] device bond_slave_0 entered promiscuous mode 03:37:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) [ 486.554108][T25100] device bond_slave_1 entered promiscuous mode 03:37:15 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, 0x0) 03:37:15 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) 03:37:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:15 executing program 0: tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) times(0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) 03:37:16 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:16 executing program 4: getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 03:37:16 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 03:37:16 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:16 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:16 executing program 4: 03:37:16 executing program 3: 03:37:16 executing program 4: 03:37:16 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:16 executing program 3: 03:37:16 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) 03:37:16 executing program 4: signalfd(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 03:37:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:16 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) [ 487.307316][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 487.314471][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:16 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:16 executing program 0: 03:37:16 executing program 3: 03:37:16 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:16 executing program 4: 03:37:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:16 executing program 0: 03:37:16 executing program 3: 03:37:16 executing program 4: 03:37:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:17 executing program 3: 03:37:17 executing program 4: [ 487.867645][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 487.873824][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:17 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:17 executing program 0: 03:37:17 executing program 3: 03:37:17 executing program 4: 03:37:17 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:17 executing program 3: 03:37:17 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0) 03:37:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x1000000050000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) 03:37:17 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:17 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) 03:37:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:17 executing program 0: tkill(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) [ 488.427323][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 488.433174][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:37:17 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x810) 03:37:17 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, 0x0) [ 488.507288][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 488.513117][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:17 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:17 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000440)={r7, 0x10000}, 0x8) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f00000002c0)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000280)={0x0, 0x5476d3ed}) sendfile(r0, r2, 0x0, 0x102000002) syz_emit_ethernet(0x0, 0x0, 0x0) 03:37:17 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:18 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000200)) [ 488.967952][T25258] ldm_validate_privheads(): Disk read failed. [ 488.983459][T25258] loop4: p1[EZD] [ 488.987287][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 488.987352][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:37:18 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)) open(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) 03:37:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) [ 489.116060][T25258] loop4: partition table partially beyond EOD, truncated 03:37:18 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) [ 489.161565][T25258] loop4: p1 start 1 is beyond EOD, truncated 03:37:18 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:18 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0) 03:37:18 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:18 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) readv(r0, 0x0, 0x0) 03:37:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:18 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000002240)='/dev/vcsa#\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r1, r0) sendto$ax25(r2, 0x0, 0x0, 0x4008040, 0x0, 0xfffffff2) 03:37:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x393, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00'}) ioctl$int_out(r1, 0x5466, &(0x7f0000000000)) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e20, @local}, {0x2, 0x4e24, @empty}, 0x7095d4ebcdb70dd6, 0x0, 0x0, 0x0, 0x2}) ptrace(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000080)={0x4, "9dca50784274d08abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b"}) r5 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r6 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_TUNER(r5, 0x4054561e, &(0x7f0000000080)={0x4, "9dca50784274d08abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b"}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000440)={r7, 0x10000}, 0x8) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f00000002c0)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000280)={0x0, 0x5476d3ed}) sendfile(r0, r2, 0x0, 0x102000002) syz_emit_ethernet(0x0, 0x0, 0x0) 03:37:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:19 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) 03:37:19 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039", 0x15}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) 03:37:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x393, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00'}) ioctl$int_out(r1, 0x5466, &(0x7f0000000000)) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e20, @local}, {0x2, 0x4e24, @empty}, 0x7095d4ebcdb70dd6, 0x0, 0x0, 0x0, 0x2}) ptrace(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000080)={0x4, "9dca50784274d08abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b"}) r5 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0x0) r6 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_TUNER(r5, 0x4054561e, &(0x7f0000000080)={0x4, "9dca50784274d08abbb1fcd26d90a7ee5176258bac03b932ee94abb540d9629b"}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000440)={r7, 0x10000}, 0x8) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f00000002c0)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000280)={0x0, 0x5476d3ed}) sendfile(r0, r2, 0x0, 0x102000002) syz_emit_ethernet(0x0, 0x0, 0x0) 03:37:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x1) 03:37:19 executing program 4: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8004}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000000c0)) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x8, &(0x7f0000000000)) 03:37:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:19 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039", 0x15}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:19 executing program 3: r0 = epoll_create1(0x0) r1 = socket(0x11, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) 03:37:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x1) 03:37:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:20 executing program 3: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001fde), 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8004}, 0x8000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) tee(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) getgroups(0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000000c0)) getpid() r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r2, r3) writev(r3, &(0x7f00000023c0), 0x1000000000000252) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ptrace$getsig(0x4202, 0x0, 0x8, &(0x7f0000000000)) 03:37:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x1) 03:37:20 executing program 4: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8004}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000000c0)) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x8, &(0x7f0000000000)) 03:37:20 executing program 0: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8004}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000000c0)) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x8, &(0x7f0000000000)) 03:37:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:20 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039", 0x15}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:20 executing program 4: clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x2, &(0x7f00000000c0)={{r0, r1/1000+10000}, {0x77359400}}, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x10000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) r3 = epoll_create1(0x0) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3}) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f410005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) 03:37:20 executing program 0: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8004}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000000c0)) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x8, &(0x7f0000000000)) 03:37:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x400) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1c, 0x0, &(0x7f0000000080)) 03:37:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 03:37:20 executing program 4: 03:37:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:20 executing program 0: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008640)={0x0, 0x0, &(0x7f0000008600)}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8004}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000000c0)) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x8, &(0x7f0000000000)) 03:37:20 executing program 3: 03:37:20 executing program 4: 03:37:20 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d0014", 0x1f}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:21 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 03:37:21 executing program 4: 03:37:21 executing program 3: 03:37:21 executing program 0: 03:37:21 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:21 executing program 4: 03:37:21 executing program 3: 03:37:21 executing program 4: 03:37:21 executing program 0: 03:37:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 03:37:21 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d0014", 0x1f}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:21 executing program 4: 03:37:21 executing program 3: 03:37:21 executing program 0: 03:37:21 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:21 executing program 3: 03:37:21 executing program 4: 03:37:21 executing program 0: 03:37:21 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:21 executing program 3: [ 492.587302][ C1] net_ratelimit: 12 callbacks suppressed [ 492.587310][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 492.599264][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:37:21 executing program 1: 03:37:21 executing program 4: [ 492.667356][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 492.673289][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:22 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d0014", 0x1f}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:22 executing program 0: 03:37:22 executing program 4: 03:37:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x0, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:22 executing program 3: 03:37:22 executing program 1: 03:37:22 executing program 4: 03:37:22 executing program 0: 03:37:22 executing program 1: 03:37:22 executing program 3: 03:37:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x0, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:22 executing program 4: [ 493.147279][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 493.153201][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:37:22 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400ffffffff", 0x24}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:22 executing program 0: 03:37:22 executing program 3: 03:37:22 executing program 4: 03:37:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x0, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:22 executing program 1: 03:37:22 executing program 1: 03:37:22 executing program 3: 03:37:22 executing program 4: 03:37:22 executing program 0: 03:37:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:22 executing program 4: [ 493.547295][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 493.553210][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:22 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400ffffffff", 0x24}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:22 executing program 1: 03:37:22 executing program 3: 03:37:22 executing program 0: 03:37:22 executing program 4: 03:37:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:23 executing program 0: 03:37:23 executing program 3: 03:37:23 executing program 4: 03:37:23 executing program 1: 03:37:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:23 executing program 4: [ 493.947297][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 493.953138][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:37:23 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400ffffffff", 0x24}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:23 executing program 3: 03:37:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:23 executing program 0: 03:37:23 executing program 4: 03:37:23 executing program 1: 03:37:23 executing program 3: 03:37:23 executing program 0: 03:37:23 executing program 4: 03:37:23 executing program 1: 03:37:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:23 executing program 4: 03:37:23 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff0", 0x27}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:23 executing program 1: 03:37:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, &(0x7f0000000200)) 03:37:23 executing program 0: 03:37:23 executing program 3: 03:37:23 executing program 4: 03:37:23 executing program 4: 03:37:24 executing program 0: 03:37:24 executing program 3: 03:37:24 executing program 1: 03:37:24 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, 0x0) 03:37:24 executing program 4: 03:37:24 executing program 3: 03:37:24 executing program 1: 03:37:24 executing program 0: 03:37:24 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, 0x0) 03:37:24 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff0", 0x27}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:24 executing program 4: 03:37:24 executing program 1: 03:37:24 executing program 3: 03:37:24 executing program 4: 03:37:24 executing program 0: 03:37:24 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, 0x0, 0x0) 03:37:24 executing program 3: 03:37:24 executing program 0: 03:37:24 executing program 4: 03:37:24 executing program 1: 03:37:24 executing program 5: 03:37:24 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff0", 0x27}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:24 executing program 3: 03:37:24 executing program 0: 03:37:24 executing program 4: 03:37:24 executing program 1: 03:37:24 executing program 5: 03:37:24 executing program 4: 03:37:25 executing program 3: 03:37:25 executing program 1: 03:37:25 executing program 0: 03:37:25 executing program 5: 03:37:25 executing program 1: 03:37:25 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff000", 0x28}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:25 executing program 3: 03:37:25 executing program 0: 03:37:25 executing program 4: 03:37:25 executing program 5: 03:37:25 executing program 1: 03:37:25 executing program 1: 03:37:25 executing program 3: 03:37:25 executing program 0: 03:37:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:25 executing program 5: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x186) r0 = socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x04\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) 03:37:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 496.542351][T15173] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 496.575760][T15173] in_atomic(): 0, irqs_disabled(): 0, pid: 15173, name: kworker/u4:6 [ 496.598227][T15173] 3 locks held by kworker/u4:6/15173: [ 496.617478][T15173] #0: ffff8882167928a8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x75d/0x10e0 [ 496.635181][T15173] #1: ffff88805703fd78 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x79f/0x10e0 [ 496.656006][T15173] #2: ffff8880969e6f10 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x36/0x40 [ 496.665917][T15173] CPU: 0 PID: 15173 Comm: kworker/u4:6 Not tainted 5.3.0+ #0 [ 496.673395][T15173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.683566][T15173] Workqueue: kstrp strp_work [ 496.688442][T15173] Call Trace: [ 496.691774][T15173] dump_stack+0x1d8/0x2f8 [ 496.696173][T15173] __cant_sleep+0x18b/0x1c0 [ 496.700679][T15173] kcm_parse_func_strparser+0x55/0x180 [ 496.706134][T15173] __strp_recv+0x727/0x19e0 [ 496.710644][T15173] strp_recv+0xb5/0xe0 [ 496.714690][T15173] ? strp_check_rcv+0x30/0x30 [ 496.719430][T15173] tcp_read_sock+0x4dd/0x1270 [ 496.724097][T15173] ? strp_check_rcv+0x30/0x30 [ 496.729073][T15173] ? tcp_sendmsg+0x50/0x50 [ 496.733665][T15173] strp_work+0x18d/0x2b0 [ 496.737908][T15173] process_one_work+0x7ef/0x10e0 [ 496.742848][T15173] worker_thread+0xc01/0x1630 [ 496.747532][T15173] kthread+0x332/0x350 [ 496.751606][T15173] ? rcu_lock_release+0x30/0x30 [ 496.756450][T15173] ? kthread_blkcg+0xe0/0xe0 [ 496.761112][T15173] ret_from_fork+0x24/0x30 03:37:26 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff000", 0x28}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:26 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 03:37:26 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000529fee)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) 03:37:26 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000e4dff1)='/dev/sequencer\x00', 0xa202, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000019ff4)) write$sndseq(r0, &(0x7f00009ab000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x4}, {}, @raw8={"7a88d654f95067fe68d2359f"}}], 0x30) 03:37:26 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000006000)="240000005e00030207fffd946fa283bc0aeee6d8f9ffffffffffffffb51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:37:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000012000)=0xffffffffad36b24d, 0x4) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000000), 0x4) sendmsg$key(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f000001b000)={&(0x7f000001bf30)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) read(r0, &(0x7f0000000040)=""/69, 0x45) 03:37:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 3: open_tree(0xffffffffffffff9c, 0x0, 0x80001) 03:37:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x0, 0x7f}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000000), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:26 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff000", 0x28}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 3: r0 = open(&(0x7f0000011000)='./bus\x00', 0x141042, 0x0) pwrite64(r0, &(0x7f0000000000)='D', 0x1, 0x0) 03:37:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x417e, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 03:37:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) 03:37:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:26 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) [ 497.621904][ T127] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 497.640841][ T127] in_atomic(): 0, irqs_disabled(): 0, pid: 127, name: kworker/u4:3 [ 497.652569][ T127] 3 locks held by kworker/u4:3/127: [ 497.658182][ T127] #0: ffff8882167928a8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x75d/0x10e0 [ 497.668221][ T127] #1: ffff8880a946fd78 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x79f/0x10e0 [ 497.680365][ T127] #2: ffff8880a84eafd0 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x36/0x40 [ 497.697861][ T127] CPU: 0 PID: 127 Comm: kworker/u4:3 Tainted: G W 5.3.0+ #0 [ 497.706478][ T127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.716552][ T127] Workqueue: kstrp strp_work [ 497.721156][ T127] Call Trace: [ 497.724454][ T127] dump_stack+0x1d8/0x2f8 [ 497.728793][ T127] __cant_sleep+0x18b/0x1c0 [ 497.733307][ T127] kcm_parse_func_strparser+0x55/0x180 [ 497.738776][ T127] __strp_recv+0x727/0x19e0 [ 497.743397][ T127] strp_recv+0xb5/0xe0 [ 497.747461][ T127] ? strp_check_rcv+0x30/0x30 [ 497.752135][ T127] tcp_read_sock+0x4dd/0x1270 [ 497.756802][ T127] ? strp_check_rcv+0x30/0x30 [ 497.761496][ T127] ? tcp_sendmsg+0x50/0x50 [ 497.765917][ T127] strp_work+0x18d/0x2b0 03:37:27 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") [ 497.770166][ T127] process_one_work+0x7ef/0x10e0 [ 497.775126][ T127] worker_thread+0xc01/0x1630 [ 497.779836][ T127] kthread+0x332/0x350 [ 497.783905][ T127] ? rcu_lock_release+0x30/0x30 [ 497.788855][ T127] ? kthread_blkcg+0xe0/0xe0 [ 497.793657][ T127] ret_from_fork+0x24/0x30 03:37:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) [ 497.818078][T25787] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) 03:37:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) read$eventfd(r3, &(0x7f0000000300), 0x8) [ 497.907871][T25793] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:27 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) 03:37:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) read$eventfd(r3, &(0x7f0000000300), 0x8) [ 498.175327][T25809] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:27 executing program 3: seccomp(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) 03:37:27 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) 03:37:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) 03:37:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:27 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") [ 498.527096][T25831] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)) 03:37:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) [ 498.674417][T15173] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 498.712416][T15173] in_atomic(): 0, irqs_disabled(): 0, pid: 15173, name: kworker/u4:6 03:37:27 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") [ 498.732329][T25845] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value [ 498.755957][T15173] 3 locks held by kworker/u4:6/15173: [ 498.777478][T15173] #0: ffff8882167928a8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x75d/0x10e0 03:37:28 executing program 0: socket$kcm(0x2b, 0x1, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 498.819610][T15173] #1: ffff88805703fd78 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x79f/0x10e0 [ 498.845128][T15173] #2: ffff8880969e63d0 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x36/0x40 [ 498.884972][T15173] CPU: 1 PID: 15173 Comm: kworker/u4:6 Tainted: G W 5.3.0+ #0 [ 498.893820][T15173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.904187][T15173] Workqueue: kstrp strp_work [ 498.904231][T15173] Call Trace: [ 498.904251][T15173] dump_stack+0x1d8/0x2f8 [ 498.904268][T15173] __cant_sleep+0x18b/0x1c0 [ 498.904284][T15173] kcm_parse_func_strparser+0x55/0x180 [ 498.904293][T15173] __strp_recv+0x727/0x19e0 [ 498.904314][T15173] strp_recv+0xb5/0xe0 [ 498.912423][T15173] ? strp_check_rcv+0x30/0x30 [ 498.912441][T15173] tcp_read_sock+0x4dd/0x1270 [ 498.912450][T15173] ? strp_check_rcv+0x30/0x30 [ 498.912469][T15173] ? tcp_sendmsg+0x50/0x50 [ 498.912481][T15173] strp_work+0x18d/0x2b0 [ 498.912501][T15173] process_one_work+0x7ef/0x10e0 [ 498.912525][T15173] worker_thread+0xc01/0x1630 [ 498.923083][T25856] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value [ 498.926833][T15173] kthread+0x332/0x350 [ 498.926847][T15173] ? rcu_lock_release+0x30/0x30 [ 498.926857][T15173] ? kthread_blkcg+0xe0/0xe0 [ 498.926872][T15173] ret_from_fork+0x24/0x30 [ 499.305999][ T26] audit: type=1326 audit(2000000248.509:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25827 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x7fc00000 [ 499.330770][ T26] audit: type=1326 audit(2000000248.509:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25827 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413631 code=0x7fc00000 03:37:28 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x6, 0x21, 0x0, &(0x7f0000000380)=0x25) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 03:37:28 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:28 executing program 0: socket$kcm(0x2b, 0x1, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) [ 499.353041][ T26] audit: type=1326 audit(2000000248.509:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25827 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=1 compat=0 ip=0x413631 code=0x7fc00000 [ 499.375456][ T26] audit: type=1326 audit(2000000248.509:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25827 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=231 compat=0 ip=0x459a09 code=0x7fc00000 03:37:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) [ 499.486418][T25871] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:28 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:28 executing program 3: seccomp(0x1, 0x6, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) 03:37:28 executing program 0: socket$kcm(0x2b, 0x1, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) [ 499.670426][ T32] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 499.700039][ T32] in_atomic(): 0, irqs_disabled(): 0, pid: 32, name: kworker/u4:2 [ 499.720314][ T26] audit: type=1326 audit(2000000248.929:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25886 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c84a code=0x50000 [ 499.752290][ T32] 3 locks held by kworker/u4:2/32: [ 499.758151][ T32] #0: ffff8882167928a8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x75d/0x10e0 [ 499.769192][ T26] audit: type=1326 audit(2000000248.929:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25886 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a09 code=0x50000 [ 499.793174][ T32] #1: ffff8880a9acfd78 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x79f/0x10e0 [ 499.821244][ T32] #2: ffff8880969e63d0 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x36/0x40 [ 499.831221][ T26] audit: type=1326 audit(2000000248.929:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25886 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a09 code=0x50000 [ 499.858155][ T32] CPU: 1 PID: 32 Comm: kworker/u4:2 Tainted: G W 5.3.0+ #0 [ 499.866686][ T32] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.876773][ T32] Workqueue: kstrp strp_work [ 499.881402][ T32] Call Trace: [ 499.884703][ T32] dump_stack+0x1d8/0x2f8 [ 499.889051][ T32] __cant_sleep+0x18b/0x1c0 [ 499.893567][ T32] kcm_parse_func_strparser+0x55/0x180 [ 499.899044][ T32] __strp_recv+0x727/0x19e0 [ 499.903589][ T32] strp_recv+0xb5/0xe0 [ 499.907682][ T32] ? strp_check_rcv+0x30/0x30 [ 499.912387][ T32] tcp_read_sock+0x4dd/0x1270 [ 499.917096][ T32] ? strp_check_rcv+0x30/0x30 03:37:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:29 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") [ 499.922069][ T32] ? tcp_sendmsg+0x50/0x50 [ 499.926499][ T32] strp_work+0x18d/0x2b0 [ 499.930769][ T32] process_one_work+0x7ef/0x10e0 [ 499.935738][ T32] worker_thread+0xc01/0x1630 [ 499.940457][ T32] kthread+0x332/0x350 [ 499.944536][ T32] ? rcu_lock_release+0x30/0x30 [ 499.949408][ T32] ? kthread_blkcg+0xe0/0xe0 [ 499.954050][ T32] ret_from_fork+0x24/0x30 03:37:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 499.975808][T25894] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value [ 500.021969][ T26] audit: type=1326 audit(2000000248.929:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25886 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a09 code=0x50000 [ 500.048274][ T26] audit: type=1326 audit(2000000248.929:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25886 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a09 code=0x50000 03:37:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@fat=@tz_utc='tz=UTC'}]}) [ 500.070725][ T26] audit: type=1326 audit(2000000248.929:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25886 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459a09 code=0x50000 03:37:29 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) [ 500.263677][T25911] FAT-fs (loop3): bogus number of reserved sectors [ 500.285639][T25911] FAT-fs (loop3): Can't find a valid FAT filesystem [ 500.309305][T25913] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, 0x0}, 0x0) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:29 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") [ 500.411798][T25911] FAT-fs (loop3): bogus number of reserved sectors [ 500.433781][T25911] FAT-fs (loop3): Can't find a valid FAT filesystem 03:37:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:29 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:29 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000d3fff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x0, 0x3}}) dup3(r0, r1, 0x0) 03:37:29 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") [ 500.666022][T25936] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:30 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delneigh={0x1c, 0x1d, 0x819}, 0x1c}}, 0x0) 03:37:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 500.876921][T25954] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value [ 500.907309][ C1] net_ratelimit: 6 callbacks suppressed [ 500.907315][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 500.918813][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:37:30 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) [ 500.987264][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 500.993165][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 501.036783][T25964] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) [ 501.271313][ T7] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 501.278636][ T7] in_atomic(): 0, irqs_disabled(): 0, pid: 7, name: kworker/u4:0 [ 501.286383][ T7] 3 locks held by kworker/u4:0/7: [ 501.292310][ T7] #0: ffff8882167928a8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x75d/0x10e0 [ 501.302367][ T7] #1: ffff8880a9887d78 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x79f/0x10e0 [ 501.313266][ T7] #2: ffff88808b14ce50 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x36/0x40 [ 501.335883][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Tainted: G W 5.3.0+ #0 [ 501.344335][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.354396][ T7] Workqueue: kstrp strp_work [ 501.354404][ T7] Call Trace: [ 501.354418][ T7] dump_stack+0x1d8/0x2f8 [ 501.354434][ T7] __cant_sleep+0x18b/0x1c0 [ 501.354444][ T7] kcm_parse_func_strparser+0x55/0x180 [ 501.354453][ T7] __strp_recv+0x727/0x19e0 [ 501.354475][ T7] strp_recv+0xb5/0xe0 [ 501.354486][ T7] ? strp_check_rcv+0x30/0x30 [ 501.389807][ T7] tcp_read_sock+0x4dd/0x1270 [ 501.394492][ T7] ? strp_check_rcv+0x30/0x30 [ 501.399196][ T7] ? tcp_sendmsg+0x50/0x50 [ 501.403645][ T7] strp_work+0x18d/0x2b0 [ 501.407910][ T7] process_one_work+0x7ef/0x10e0 [ 501.412881][ T7] worker_thread+0xc01/0x1630 [ 501.417582][ T7] kthread+0x332/0x350 03:37:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, 0x0, 0x0) 03:37:30 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:30 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="fc", @ANYRES16], 0x2}}, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000240)="feb3ede027232be26020c6e8044e00427cbb68f2bb6f1b5876bb8d0dc3758581"}) [ 501.421685][ T7] ? rcu_lock_release+0x30/0x30 [ 501.426554][ T7] ? kthread_blkcg+0xe0/0xe0 [ 501.431155][ T7] ret_from_fork+0x24/0x30 [ 501.467282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 501.473139][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:37:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6653070000003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba001b50c0da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e689f7615baf78f08ea33bcb860d6a0b61193d4a1cb622431d42fee5e91531b", 0xa1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 501.554186][T25988] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:30 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:31 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") [ 501.776211][T26007] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) 03:37:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:31 executing program 0: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:31 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x0, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 502.429586][T26023] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:31 executing program 0: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) [ 502.578474][ T127] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 502.591216][ T127] in_atomic(): 0, irqs_disabled(): 0, pid: 127, name: kworker/u4:3 03:37:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 502.627033][ T127] 3 locks held by kworker/u4:3/127: [ 502.655471][ T127] #0: ffff8882167928a8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x75d/0x10e0 [ 502.686544][ T127] #1: ffff8880a946fd78 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x79f/0x10e0 [ 502.704097][T26038] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value [ 502.713351][ T127] #2: ffff8880969e63d0 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x36/0x40 [ 502.728519][ T127] CPU: 0 PID: 127 Comm: kworker/u4:3 Tainted: G W 5.3.0+ #0 [ 502.737152][ T127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.747340][ T127] Workqueue: kstrp strp_work [ 502.751915][ T127] Call Trace: [ 502.755202][ T127] dump_stack+0x1d8/0x2f8 [ 502.759520][ T127] __cant_sleep+0x18b/0x1c0 [ 502.764003][ T127] kcm_parse_func_strparser+0x55/0x180 [ 502.769443][ T127] __strp_recv+0x727/0x19e0 [ 502.773935][ T127] strp_recv+0xb5/0xe0 [ 502.777982][ T127] ? strp_check_rcv+0x30/0x30 [ 502.782636][ T127] tcp_read_sock+0x4dd/0x1270 [ 502.787291][ T127] ? strp_check_rcv+0x30/0x30 [ 502.791949][ T127] ? tcp_sendmsg+0x50/0x50 [ 502.796341][ T127] strp_work+0x18d/0x2b0 [ 502.800566][ T127] process_one_work+0x7ef/0x10e0 [ 502.805515][ T127] worker_thread+0xc01/0x1630 [ 502.810188][ T127] kthread+0x332/0x350 [ 502.814234][ T127] ? rcu_lock_release+0x30/0x30 [ 502.819059][ T127] ? kthread_blkcg+0xe0/0xe0 [ 502.823627][ T127] ret_from_fork+0x24/0x30 03:37:33 executing program 0: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:33 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x0, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6653070000003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba001b50c0da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e689f7615baf78f08ea33bcb860d6a0b61193d4a1cb622431d42fee5e91531b", 0xa1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:37:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) 03:37:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f00000005c0)=@hci, 0x80, &(0x7f00000049c0), 0x0, &(0x7f0000004a40)=""/241, 0xf1}}], 0x70, 0x0, &(0x7f0000000200)={0x77359400}) read$eventfd(r3, &(0x7f0000000300), 0x8) 03:37:34 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 504.739913][T26057] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value [ 504.768546][ T127] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 504.780203][ T127] in_atomic(): 0, irqs_disabled(): 0, pid: 127, name: kworker/u4:3 03:37:34 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 504.805733][ T127] 3 locks held by kworker/u4:3/127: [ 504.821780][ T127] #0: ffff8882167928a8 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x75d/0x10e0 03:37:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) [ 504.883770][ T127] #1: ffff8880a946fd78 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x79f/0x10e0 [ 504.933219][ T127] #2: ffff8880896f8290 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x36/0x40 [ 504.968258][ T127] CPU: 1 PID: 127 Comm: kworker/u4:3 Tainted: G W 5.3.0+ #0 03:37:34 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 504.976980][ T127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.976998][ T127] Workqueue: kstrp strp_work [ 504.977004][ T127] Call Trace: [ 504.977020][ T127] dump_stack+0x1d8/0x2f8 [ 504.977042][ T127] __cant_sleep+0x18b/0x1c0 [ 505.004708][ T127] kcm_parse_func_strparser+0x55/0x180 [ 505.010310][ T127] __strp_recv+0x727/0x19e0 [ 505.014861][ T127] strp_recv+0xb5/0xe0 [ 505.014874][ T127] ? strp_check_rcv+0x30/0x30 [ 505.014887][ T127] tcp_read_sock+0x4dd/0x1270 [ 505.014900][ T127] ? strp_check_rcv+0x30/0x30 [ 505.034104][ T127] ? tcp_sendmsg+0x50/0x50 [ 505.038524][ T127] strp_work+0x18d/0x2b0 [ 505.042871][ T127] process_one_work+0x7ef/0x10e0 [ 505.048243][ T127] worker_thread+0xc01/0x1630 [ 505.052965][ T127] kthread+0x332/0x350 [ 505.057023][ T127] ? rcu_lock_release+0x30/0x30 [ 505.061849][ T127] ? kthread_blkcg+0xe0/0xe0 [ 505.066423][ T127] ret_from_fork+0x24/0x30 [ 505.071145][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 505.077121][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:37:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 505.084584][T26072] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value 03:37:34 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="290000002000390700083fffffffda060200000039e80001040000040d001400fffffffffffff00001", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x2fbe9b8c8560219, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x0, &(0x7f0000000080)="119ca50d5e2ccfe47bf070") 03:37:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) 03:37:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@dots='dots'}], [{@context={'context', 0x3d, 'root'}}]}) 03:37:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be96c4b5a30d42a", 0x9}], 0x1}, 0x0) [ 505.280254][T26086] FAT-fs (loop0): Unrecognized mount option "context=root" or missing value