r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x1f0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmsg$alg(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="18005300000900000020000000ffce5ff61b00e700000000"], 0x18}, 0x0) 03:02:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x67fff, 0x0) accept$alg(r3, 0x0, 0x0) connect$l2tp(r2, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) write$binfmt_elf64(r5, &(0x7f0000000040)=ANY=[], 0x10000011d) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c7465720000000000000000000000e24700000000000000000000000000000068000000b79950537103699320ec9bcb8f0e201f5c4cbd4d5a87ca6c89bce2bb0ef8c7b2b90df71f0edea3631e145a86a5c613fe254503e5b0f37fcf67f5591bdf33c1ee6a9002f251881e85c8dd63f7da162ed4205cec3424265eab79e594634375ba727db07328e8b9d398340fbd86d2f198ab51e5d942d148aa567faf05a397169732943d13558e26fc14e3ae166ffb"], &(0x7f0000000180)=0x8c) setsockopt$sock_int(r6, 0x1, 0x2a, &(0x7f0000000040), 0x4) recvmmsg(r6, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x0, 0x0) bind$x25(r3, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) dup2(r2, r0) 03:02:16 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:16 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) read(r1, 0x0, 0xfffffffffffffc3a) 03:02:16 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:17 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:17 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:17 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:17 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:17 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:17 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 333.850120] net_ratelimit: 16 callbacks suppressed [ 333.850125] protocol 88fb is buggy, dev hsr_slave_0 [ 333.855133] protocol 88fb is buggy, dev hsr_slave_1 03:02:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) io_setup(0x93, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f00000002c0)={r3, &(0x7f00000001c0)=""/22}) 03:02:17 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:17 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:17 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040)={0xff, 0x8, 0xfff, 0xffffffffffffff84, 0x80000001, 0xa5, 0x8, 0x8e39, 0x8001, 0x7, 0x7}, 0xb) 03:02:17 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80800) readv(r0, &(0x7f0000001400)=[{&(0x7f0000000100)=""/237, 0xed}, {&(0x7f0000000200)=""/114, 0x72}, {&(0x7f0000000280)=""/75, 0x4b}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000080)=""/17, 0x11}, {&(0x7f0000001300)=""/219, 0xdb}], 0x6) timer_create(0xfffffffffffffffd, 0x0, &(0x7f0000001480)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) [ 334.000152] protocol 88fb is buggy, dev hsr_slave_0 [ 334.005376] protocol 88fb is buggy, dev hsr_slave_1 03:02:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x1, 0x200000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0xd8, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0xd2d, @empty, 0x9}, @in6={0xa, 0x4e23, 0x82d, @rand_addr="bf9c002f0ca09ed7ed1e232ed4c07f18", 0xd59c}, @in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xde}, @in6={0xa, 0x4e20, 0x3, @mcast1, 0x9}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e22, 0x355f, @dev={0xfe, 0x80, [], 0x26}, 0x2}, @in6={0xa, 0x4e21, 0x8, @remote, 0x8000}, @in={0x2, 0x4e22, @broadcast}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYRES32=r2, @ANYBLOB="1e0401007f00291e608d79320035397dbb00c869ab15df4f5fb7e885670cba4abad439b3d037a2192a1dba084b33883b13f2247973b520314544b99c021cfa9a845f8b1f98ad2fd597f499b4510661224953f829b3b1a10d9d90ebe6c5c0ec50319abac42eac25a14a5b8b7e3240f9a8e063809a535e85861ac05cda2c061e44ac0a1a81e616cfca5b67cb03edc1ec81327f3cf892728d70d13875a34bee"], 0xa) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000540)=""/228, 0xe4, 0x10002, &(0x7f0000000400)={0x11, 0x1, r3, 0x1, 0x6, 0x6, @broadcast}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0xff00000000000000, 0x0, 0x15}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000440)={r2, 0x5}, &(0x7f0000000640)=0x8) 03:02:18 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x12, r0, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) fchdir(0xffffffffffffffff) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x20000000) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r2 = open(0x0, 0x0, 0x0) r3 = dup(r1) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x4e63, 0x1, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x1000000020000008, &(0x7f00008d4fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000280)={0x2, 0x9, 0x8, 'queue0\x00', 0x200}) setsockopt$inet_tcp_int(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x18, &(0x7f00000001c0), 0x4) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000100)=0x0) sched_getattr(r4, &(0x7f00000000c0)={0x30}, 0x30, 0x0) r5 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r1, r0, 0x0, 0x8000fffffffe) [ 334.080130] protocol 88fb is buggy, dev hsr_slave_0 [ 334.085287] protocol 88fb is buggy, dev hsr_slave_1 [ 334.090550] protocol 88fb is buggy, dev hsr_slave_0 [ 334.095637] protocol 88fb is buggy, dev hsr_slave_1 03:02:18 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2000000c00ffbf, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x200008001fffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000000)=0x2, 0x0, 0x40000000002, 0x0, 0x0, 0x0) clone(0x2102801df7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 03:02:18 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:18 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 334.640564] protocol 88fb is buggy, dev hsr_slave_0 [ 334.646230] protocol 88fb is buggy, dev hsr_slave_1 03:02:18 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x686d, 0x140) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000040)=""/175, &(0x7f0000000100)=0xaf) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x4, 0x20, 0x584d, 0x5}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r3, 0xffff}, 0x8) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="e8000000120010002dbd7000ffdbdf25786362632d6165732d6e656f6e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000079902f9f429fba3323318f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000150000000000000000000000000000000000002400810000000000000000000000000800010004000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040080}, 0x4000) read(r2, 0x0, 0xffffff1e) 03:02:18 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:19 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:19 executing program 1: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000340)='./file0\x00', 0x0, 0x18}, 0xf5e62455d92cf2b6) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20100, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x5, 0x1, 0x5, 0x7, 0x3, 0x8, 0xffffffff, 0x43e9, 0x8, 0x8, 0x2, 0x3035}) write(r0, &(0x7f0000000480)="eeee753d836deb806493cf66b32f9a39d03d5acccde04f3ddd2d3a685b51d104e6f2ff14564585d518f7d05bfa207dc82fdfed9ba907ba8fcae0604d974de1d81903bc63d83ddcdbdd9c06dae109201980a9ea4fc89a33ea04000000bcba6f40683ada407fdd9c9072ae08164f76f978c0d05c5694a64c6b72b4d219a045be7549458c5241cd8be52992f4d020e4d70951a94fb724b3955e24a0d211b2154243b756695714c73e326b794169a9d96f3335168617bac3df5db15e39a2022907677069034d47fb8b55b72ad472486781ad710bd568a33f6546f3945f7edb4507a19ca68c913b72223b3ce47367bfed04848f", 0xfe80) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) r4 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000240)=0x4) splice(r0, &(0x7f00000003c0), r4, &(0x7f0000000400), 0x9, 0x2f8e8128a1b299b1) sendfile(r2, r4, 0x0, 0x88000fc000000) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r7+30000000}, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:02:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18Mo\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x00\x00\xe0b\xd1\r$\xde\xd5@i\x18\xa6k\x00\b\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xeca\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xd3\xaf7\x94PX\x83\x9e\x81\"`\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\x00u\xbd\x88e\xb9j\x90\xbd\xe8\xfdMb\x98\xefod9KO\x8fm\x82?\b\x87#\xd2\x9f\xc2\xfc\r\x8e\x96\xf0\x1b&\a\xf9\n\x80\x83\xd8\xceq\x9d\x91i\x8f\xd6h\xdcT\xdf\x8a\xcb\xa8\xd9\xaf:W#?\x17\xa7\v\xa3\xd1\xeb\xb3\x11%\xe5\xaa\xc0\x89M\a6o\xe3EE@y\x12\xd8\x9a\xceP1\x80\xa7\xbb\x88\x95^\ru\xd2\x017MbMT\xcf\x01\xb2\x81\x05\xb65y\xb3', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(0x0, 0x7ff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x400) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, 0x0, 0x1c72dae843327e0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="18ed55681782048c4d73257a955d17bfd4d37b1c8e56737ccdf9f62094c584b48b4b28ba72fc668fbad8acbc05fb5256d211e0cc064b7d70f248e6bb3d84a2c2a5e9ddfbffd2079c35388039fae26bcd244a4a8d81168cef8db37d929eb7b19daa5919f344bb2309f159e34016504b663e054e63ce5499d9024a110fcbf07a45eec3415f7c7583a3752d3ec143d03b3303dd656ccb8e7ec544539e33788dd0c499d9195abdae20423adecfa3b42c7c1f72ed673cfbb745cdffaf42f545fc8245cd2a25429d65ebf3664a6ef3264cd70b1df2766e4e7115f254f08da9bb8f687c170158d46bf534d7320d4ad6f9407d8efe005fc8f7886122bccd9cd044903b5cbd83ed15776b27964c314a3c3d947280348909d47ea4c2798a42511ea779c060", @ANYRES32], 0x4) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000200)={0x0, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2a}}}, {{0x2, 0x4e21, @remote}}}, 0x108) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000400)={0x2, 0x0, 0x3, 0x2, 0x8}, 0xc) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="0f01f231d796b77f0a8bb2d871181c0ae966c289fb5e6d0be1aa6ef84e9e4ae7560174f68c77de175eabcd25c4d1760bd56e3705f024e5b61bed31d4e9b251d2dbc6099242429aa8e26446a0cabb1d2593a06f5470cbc0888360746c4d1444be9e14fdb27cebb518ec9e", 0x6a, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000000c0)='blacklist\x00', &(0x7f0000000140)={'syz', 0x1}, r4) fcntl$getownex(r2, 0x10, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCNXCL(r1, 0x540d) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x8000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, &(0x7f0000000000)={0x0, 0x0, 0x301f, 0x0, 0x0, 0x0, 0x5}) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYRES32], 0x0) unshare(0x40000000) flistxattr(r0, 0x0, 0x0) 03:02:19 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 335.673425] IPVS: ftp: loaded support on port[0] = 21 03:02:19 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x0, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:19 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) read(r1, 0x0, 0xffffff1e) 03:02:20 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:20 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000080)={0x0, 0x7ff, 0x35c8, &(0x7f0000000040)=0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'yam0\x00', 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1, 0xffff, 0xfffffffffffffffa, 0x6}, &(0x7f0000000480)=0x9) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) recvmmsg(r2, &(0x7f0000000f00), 0x483, 0x10000, &(0x7f0000001000)={0x77359400}) 03:02:20 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x0, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:20 executing program 1: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0}, 0x20) 03:02:20 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0xffffff1e) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xcc000, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000040)) 03:02:20 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:20 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:20 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:21 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:21 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:21 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:21 executing program 2: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@statfs_quantum={'statfs_quantum'}}]}) 03:02:21 executing program 1: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:21 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:21 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x4) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000200)=0x4, &(0x7f0000000240)=0x4) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000040)={@empty, @remote, 0x0}, &(0x7f00000002c0)=0xc) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000300)=r5) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000180)={&(0x7f0000000280), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x400, 0x703d29, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:21 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x0, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:21 executing program 1: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:21 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 03:02:21 executing program 1: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:21 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:21 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}], 0x1) 03:02:21 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:22 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000300)="002862b65b979db72ddcd93a6d486f8d", 0xfe6d) recvmmsg(r1, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000001200)=""/4096, 0x100e}], 0x1}}], 0x1, 0x0, 0x0) 03:02:22 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:22 executing program 2: bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x15, 0x0, 0x0}, 0x20) 03:02:22 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:22 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 03:02:22 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, 0x0, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:22 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:22 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x0, 0x0) 03:02:22 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x8, 0x800}) 03:02:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/packet\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000001380)=""/158, 0x9e}, {&(0x7f0000001440)=""/213, 0xd5}], 0x2, 0x0) 03:02:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xff}) r1 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:22 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x0, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:22 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 339.040385] net_ratelimit: 24 callbacks suppressed [ 339.040391] protocol 88fb is buggy, dev hsr_slave_0 [ 339.050493] protocol 88fb is buggy, dev hsr_slave_1 03:02:23 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x0, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x8, 0x0, 0x76cd79fa11a40e18, 0x7fffffff}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000180)={r2, 0x1}) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0)=0x9, 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r0, 0x100000000000000) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x4, 0xe0, 0x6, 0x800}) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000100)={0x3}) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r3, 0x0, 0xffffff1e) 03:02:23 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:23 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x0, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 340.090124] protocol 88fb is buggy, dev hsr_slave_0 [ 340.095260] protocol 88fb is buggy, dev hsr_slave_1 [ 340.240106] protocol 88fb is buggy, dev hsr_slave_0 [ 340.245249] protocol 88fb is buggy, dev hsr_slave_1 [ 340.320533] protocol 88fb is buggy, dev hsr_slave_0 [ 340.325631] protocol 88fb is buggy, dev hsr_slave_1 [ 340.330762] protocol 88fb is buggy, dev hsr_slave_0 [ 340.335818] protocol 88fb is buggy, dev hsr_slave_1 03:02:25 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, 0x0, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x2102) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x5) 03:02:25 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:25 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:25 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') 03:02:25 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000000)={0x7, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x81, 0x6, 0x5, 0x3, 0x75d}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0xc0, 0x1, 0x4, 0x72, r3}, &(0x7f00000001c0)=0x10) ioctl$SIOCRSACCEPT(r2, 0x89e3) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r2, 0x0, 0xffffff1e) 03:02:25 executing program 1: prctl$PR_SET_FP_MODE(0x2d, 0x1) syz_open_dev$sndseq(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) fchdir(0xffffffffffffffff) sendto$unix(0xffffffffffffffff, 0x0, 0x7f, 0x0, 0x0, 0x5f1b) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) 03:02:25 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$RTC_WIE_ON(r1, 0x700f) dup(0xffffffffffffffff) creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x3) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0x0, &(0x7f0000000180)='attr/keycreate\x00') sched_setaffinity(0x0, 0xfffffffffffffff1, &(0x7f00000001c0)=0xd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x24040, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) getdents(r2, &(0x7f0000000240)=""/4096, 0x1000) ioctl$RTC_AIE_OFF(r0, 0x7002) socket$packet(0x11, 0x0, 0x300) 03:02:25 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:25 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:25 executing program 1: prctl$PR_SET_FP_MODE(0x2d, 0x1) syz_open_dev$sndseq(0x0, 0x0, 0x480) sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) fchdir(0xffffffffffffffff) sendto$unix(0xffffffffffffffff, 0x0, 0x7f, 0x7fc, 0x0, 0x5f1b) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) 03:02:26 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$RTC_WIE_ON(r1, 0x700f) dup(0xffffffffffffffff) creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x3) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0x0, &(0x7f0000000180)='attr/keycreate\x00') sched_setaffinity(0x0, 0xfffffffffffffff1, &(0x7f00000001c0)=0xd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x24040, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) getdents(r2, &(0x7f0000000240)=""/4096, 0x1000) ioctl$RTC_AIE_OFF(r0, 0x7002) socket$packet(0x11, 0x0, 0x300) [ 344.250130] net_ratelimit: 16 callbacks suppressed [ 344.250136] protocol 88fb is buggy, dev hsr_slave_0 [ 344.260171] protocol 88fb is buggy, dev hsr_slave_1 [ 344.400158] protocol 88fb is buggy, dev hsr_slave_0 [ 344.405273] protocol 88fb is buggy, dev hsr_slave_1 [ 344.480096] protocol 88fb is buggy, dev hsr_slave_0 [ 344.485224] protocol 88fb is buggy, dev hsr_slave_1 [ 344.490351] protocol 88fb is buggy, dev hsr_slave_0 [ 344.495413] protocol 88fb is buggy, dev hsr_slave_1 03:02:28 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, 0x0, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) 03:02:28 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:28 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0x0) 03:02:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x165c42) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:28 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:28 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 03:02:28 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x401, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000002c0)={0x32, 0x3, 0x0, {0x0, 0x11, 0x0, 'security.selinux\x00'}}, 0x32) 03:02:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002fc0)={0x0}}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d8, 0x0) 03:02:28 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 03:02:28 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:29 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 345.040108] protocol 88fb is buggy, dev hsr_slave_0 [ 345.045388] protocol 88fb is buggy, dev hsr_slave_1 03:02:31 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100), &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') unshare(0x40600) preadv(r0, 0x0, 0x0, 0x0) 03:02:31 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)=ANY=[@ANYBLOB="246432630bcc"]) 03:02:31 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:31 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x82f, 0x0, @dev={0xac, 0x4}, @remote}, @icmp=@timestamp_reply}}}}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d8, 0x0) 03:02:31 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x401, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000002c0)={0x32, 0x3, 0x0, {0x0, 0x11, 0x0, 'security.selinux\x00'}}, 0xffbe) 03:02:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, 0x0) 03:02:31 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='/dev/\x06\x00hmem\x00') 03:02:31 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:32 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 349.440155] net_ratelimit: 24 callbacks suppressed [ 349.445180] protocol 88fb is buggy, dev hsr_slave_0 [ 349.450267] protocol 88fb is buggy, dev hsr_slave_1 [ 350.480138] protocol 88fb is buggy, dev hsr_slave_0 [ 350.485247] protocol 88fb is buggy, dev hsr_slave_1 [ 350.640165] protocol 88fb is buggy, dev hsr_slave_0 [ 350.645323] protocol 88fb is buggy, dev hsr_slave_1 03:02:34 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100), &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000003d00)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="489592572ca0aed6de1b4bc6da12572c", 0x0, r3}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="d214c0e12eb5e6ea076cca63e0537907"}, 0x1c) dup3(r1, r2, 0x0) 03:02:34 executing program 2: 03:02:34 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:34 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xa, 0x1010, r0, 0x0) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) [ 350.720112] protocol 88fb is buggy, dev hsr_slave_0 [ 350.725208] protocol 88fb is buggy, dev hsr_slave_1 [ 350.730309] protocol 88fb is buggy, dev hsr_slave_0 [ 350.735350] protocol 88fb is buggy, dev hsr_slave_1 03:02:34 executing program 2: [ 350.888738] audit: type=1400 audit(1565233354.806:86): avc: denied { map } for pid=18970 comm="syz-executor.4" path="/dev/ptmx" dev="devtmpfs" ino=14056 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file permissive=1 03:02:34 executing program 1: 03:02:34 executing program 2: 03:02:34 executing program 1: 03:02:34 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:35 executing program 2: 03:02:37 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100), &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:37 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:37 executing program 1: 03:02:37 executing program 2: 03:02:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x813781cefe5cdd2d) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000040)) read(r1, 0x0, 0xffffff1e) 03:02:37 executing program 2: 03:02:37 executing program 1: 03:02:37 executing program 2: 03:02:37 executing program 1: 03:02:37 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x10001, 0x0, 0x0) 03:02:37 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='X', 0x1}], 0x1) close(r2) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 354.640117] net_ratelimit: 16 callbacks suppressed [ 354.640122] protocol 88fb is buggy, dev hsr_slave_0 [ 354.650320] protocol 88fb is buggy, dev hsr_slave_1 [ 354.800138] protocol 88fb is buggy, dev hsr_slave_0 [ 354.805274] protocol 88fb is buggy, dev hsr_slave_1 [ 354.880138] protocol 88fb is buggy, dev hsr_slave_0 [ 354.885242] protocol 88fb is buggy, dev hsr_slave_1 [ 354.890389] protocol 88fb is buggy, dev hsr_slave_0 [ 354.895435] protocol 88fb is buggy, dev hsr_slave_1 [ 355.440130] protocol 88fb is buggy, dev hsr_slave_0 [ 355.445237] protocol 88fb is buggy, dev hsr_slave_1 03:02:40 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:40 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0x47) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:02:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000003) 03:02:40 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) read(r1, 0x0, 0xffffff1e) 03:02:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000040)={0x0, 0xf4b}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="0203000006cfb5c7a0ac5d8575370c71acf38e1a50c7e442a7b107101bf10115e451a71e939966fee1366891cb7c10d2b666c0fca8a9d016f3cb4e5593d93a44020293bc0cca09b5b2b65ba6fad8392af9e3168f0360a6efba7a618390e83536e12577109a6245f571ddde2ffe94bf45d8984239e966ffd464d1ee8c2fcc5906c865acd4bec0ca4dd1486106d7863e98a45164262885080ac18bcb32373db4d1c77b4d16cced36f7ae9f63150cd223a47a02a799a27efe40ed3406e88f76"], 0xa) 03:02:41 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x82f, 0x0, @dev={0xac, 0x4}, @remote}, @icmp=@timestamp_reply}}}}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x400002) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:43 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:43 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:43 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:43 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:43 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x49, 0x24201) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000100), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x82000024}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)=@polexpire={0x130, 0x1b, 0x100, 0x70bd2b, 0x25dfdbfe, {{{@in=@dev={0xac, 0x14, 0x14, 0x17}, @in6=@mcast1, 0x4e20, 0x7, 0x4e21, 0x400, 0xa, 0xa0, 0x20, 0xff, r2, r3}, {0x1, 0x80, 0x1, 0x0, 0x9, 0x800, 0xffffffff, 0x5}, {0x40, 0xffffffffffffff80, 0xffffffffb128e0bc, 0x100}, 0x80000000, 0x6e6bbc, 0x0, 0x1, 0x2}, 0x785}, [@algo_aead={0x4c, 0x12, {{'morus1280-sse2\x00'}, 0x0, 0x300}}, @lifetime_val={0x24, 0x9, {0x9, 0x8000, 0x4a, 0x2}}]}, 0x130}, 0x1, 0x0, 0x0, 0x4000804}, 0x801) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400800, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000000)) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r4, 0x0, 0xffffff1e) 03:02:43 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x620000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000300)=r0) r2 = getpgid(0xffffffffffffffff) get_robust_list(r2, &(0x7f00000004c0)=&(0x7f0000000480)={&(0x7f00000003c0)={&(0x7f0000000380)}, 0x0, &(0x7f0000000440)={&(0x7f0000000400)}}, &(0x7f0000000500)=0x18) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x899, 0x0, 0x10003, 0x4}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000340)={r3, 0x6}) fsetxattr$security_evm(r1, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@v2={0x3, 0x0, 0x13, 0x1, 0x93, "b4de3b1509f9a075936b576d27a5670c10a6379282035c46e37afbf9f06734a89ea1b0dadc453cba164ccb6ad0c265a92b6410a7fae168b78e4dfc15fb382d7f6ee4cdbd97d5dd075df4b61b9c13a30c3d6dfd964455120ef55f56f31a84af5735cfdea96ec65b438265e15139b54b6c11a2665fa622bad11dc0ffc7792231795a3725113b954651a1c3f295967834b3eb8d6b"}, 0x9d, 0x3) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200008}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r4, 0x403, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x1, 0x1, 0x5]}]}, 0x34}, 0x1, 0x0, 0x0, 0xc9decf6d3f175cbf}, 0x40) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) [ 359.840140] net_ratelimit: 24 callbacks suppressed [ 359.840146] protocol 88fb is buggy, dev hsr_slave_0 [ 359.850186] protocol 88fb is buggy, dev hsr_slave_1 03:02:43 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) fcntl$getown(r0, 0x9) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000080)) r2 = fcntl$getown(r1, 0x9) fcntl$setown(r0, 0x8, r2) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x304}, "d6dda71beab9d81a", "0a3adcddaccba61ac00af45116b33141", "1c505238", "daf676cd8d361770"}, 0x28) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f00000000c0)={0x0, "cc66a6d73bf9345c9f7d7e043b7e2499b1ff0a087c50b382c054424f80d17eb8", 0x2, 0x1}) 03:02:44 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000002680)=[{&(0x7f0000000040)=@in={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001240)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="a2f2ba01fb6ca455deb878bb33", 0xd}, {&(0x7f00000010c0)="9ade507beddc4761a7cb251242a43c7fe2fe0a34618ceaed8b634af33bedaaafde758e4251b9dd67d9764d186ad25db5835aa8581364d986828bd5a561a6e178040aeb35e4dc3e4a8ff305a711f9fa714ff4304a581279afa134c8780359a4f9e5f0279b13aa4cbbebebf7352bf580f364e6adb8b765f01203b204ea28be616c6a803389169a6ffdf943196a4cc6f4e7028a4c0b7c75dfd86658f64ee2789f60d814d919ce5cf425cb16992d6550dacda1e1", 0xb2}, {&(0x7f0000001180)="7baeb0470828fb46b4fcbb7929fb1f40fe2253a19c67f0b94ea69893fbb6ad4cbc80", 0x22}, {&(0x7f00000011c0)="331f65788db4d0fc825b89acfa6ff2eb6168badba472aed30a8a19c274604bc9c3a6b25100e4480c9d14aa52dc4f9753894adad80413f68a13c3a2effaf574812b3a5a4d3f9ddff1d3f4cf2b46c16f9398", 0x51}], 0x5, 0x0, 0x0, 0x800}, {&(0x7f00000012c0)=@in6={0xa, 0x4e22, 0x1, @mcast2, 0x100000001}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000001300)="f45b5b12db615a33645395bf9e53cb10562309c54fef69c08f44b41e297680dbb7922d208815cb953ccd202b4233a42c257ee18bb7151a5b9c90a1af5a2870e7b92844f330562934f0e62327fd8bd380f8ee9efabec587c4f566e3e0790e6e8be0fdfd630ef83d13b643a4211e842b5b9557db43fbab3f67f870f63595f29b58edb9d5c0d99d3165a67ac3ca5672", 0x8e}, {&(0x7f00000013c0)="038e505fb9a2072508cdee6d6af4723c87e369e3c41eb25ed33d3ed148c5d50fb777f40ad1549482955331577fe2b49b1cfe8c9b7d2353965b23bf39ccd17303dc5f6e325023f60660bba657931ec7dcf1ca23b8b64549efc251c537f428ead4ab51252d0887efa8ea1bd1e01c8c1043d41af6fa6402056382302fdd7f8a54ec180ef6f02bdc470facb43d8ac3650db592a2ecc35924ca", 0x97}, {&(0x7f0000001480)="3f81736abbc962410c9617571d4f1935f9a28f4b0ffe823365e55f6d2ebf7516233b30ced28d9ba049fe1c8b0d102f31b21b", 0x32}], 0x3, &(0x7f0000001500)=[@dstaddrv6={0x20, 0x84, 0x8, @empty}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @multicast1}}, @init={0x18, 0x84, 0x0, {0xfffffffffffffffe, 0x2, 0x9, 0x1000}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x7f}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}], 0xa8, 0x4000000}, {&(0x7f00000015c0)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002600)=[{&(0x7f0000001600)="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", 0x1000}], 0x1, &(0x7f0000002800)=ANY=[@ANYBLOB="18000000000000008400000005000000300000000000000027f1648fd47fa4fdd576b64df15adbb245f8e6f4d790a96ef5f56349aa5d1af13d59fb775edce1d19dda103fa5f77737ac8b9f27860a5cbd69c9b68191dc86f78344a680378c2ca69dcaa67cdd9217de176e51733ae2732b752214e8bd8e27b3a621818084ca70818d23cb9b9f785c"], 0x18, 0x880}], 0x3, 0x4004800) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000002740)={0x0, 0xfff}, &(0x7f0000002780)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000027c0)={r2, 0x3}, 0x8) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:44 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:44 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = accept(r0, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e20, 0x9, @empty, 0x1}}, 0x8, 0x477e, 0x8, 0x101}, 0x98) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:44 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xd2, 0xa000) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:44 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000000c0)={0x200, 0x1, 0x1, {}, 0x9, 0x100000000}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101002, 0x0) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000040)="86", 0x1}], 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@nat={'nat\x00', 0x1b, 0x5, 0x6f8, 0x308, 0x308, 0x4a8, 0x1a0, 0x1a0, 0x628, 0x628, 0x628, 0x628, 0x628, 0x5, &(0x7f0000000140), {[{{@uncond, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x100, 0x4, 0x1, [0xfffffffffffffff7, 0x1, 0xfffffffffffffffe, 0x1, 0x5, 0x52, 0x0, 0x80000001, 0xfb7, 0xab1, 0x100000001, 0xffff, 0x10000000, 0x1f, 0x2af, 0x800], 0x6}}, @common=@dst={0x48, 'dst\x00', 0x0, {0xfffffffffffffff9, 0x5, 0x1, [0x7, 0x4, 0x2, 0x800000000, 0x0, 0x7ff, 0x100000001, 0x2, 0x7, 0xd5, 0x10000, 0xf609, 0xffffffffffffffff, 0x100, 0x2, 0xffffffff], 0xe}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x1, @ipv6=@remote, @ipv6=@mcast2, @gre_key=0x3, @icmp_id=0x68}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d6, 0x4d3, 0x1, 0x57afd83d}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x5, 0x1f}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x1d}, @ipv4=@multicast2, @icmp_id=0x64, @icmp_id=0x66}}}, {{@uncond, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x3f, 0xb4a, 0x3, 0x8001, 0xa0ff, @rand_addr="8bcb7df00771f3f649ad6c768ef21cbf", @local, @local, [0xffffffff, 0x839f19eb5f51fd7, 0xffffffff], [0xffffff00, 0x0, 0x0, 0xffffffff], [0xff000000, 0xffffff00, 0xffffffff, 0xffffffff], 0x1604, 0x10}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x4, @ipv6=@rand_addr="7025c4630e9b8a7647f1285c178c5fcd", @ipv6=@local, @port=0x4e23, @icmp_id=0x67}}}, {{@ipv6={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffffff, 0xff, 0xffffffff, 0xffffff00], [0xffffff00], 'veth1_to_bridge\x00', 'yam0\x00', {}, {}, 0x7f, 0x5, 0x7, 0x1c}, 0x0, 0x138, 0x180, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x2, 0x0, 0x1, [0x7, 0x3ff, 0x3, 0x1, 0x2a, 0x8, 0x2, 0x7f0, 0x9, 0x2, 0x1, 0x5, 0x7, 0x3, 0x7fffffff, 0x4], 0xa}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x7f, 0x2, 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x6, @ipv6=@ipv4={[], [], @remote}, @ipv6=@ipv4={[], [], @empty}, @icmp_id=0x68, @gre_key=0x1000000}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x758) [ 360.880140] protocol 88fb is buggy, dev hsr_slave_0 [ 360.885348] protocol 88fb is buggy, dev hsr_slave_1 [ 361.040179] protocol 88fb is buggy, dev hsr_slave_0 [ 361.045289] protocol 88fb is buggy, dev hsr_slave_1 [ 361.120134] protocol 88fb is buggy, dev hsr_slave_0 [ 361.125263] protocol 88fb is buggy, dev hsr_slave_1 [ 361.130390] protocol 88fb is buggy, dev hsr_slave_0 [ 361.135435] protocol 88fb is buggy, dev hsr_slave_1 03:02:46 executing program 2: r0 = creat(&(0x7f00000000c0)='.\x00', 0x1) ioctl$UI_DEV_DESTROY(r0, 0x5502) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x44, 0x800) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000080)=0xfffffffffffffc00) 03:02:46 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:46 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000040)) 03:02:46 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x10000, 0x0) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000040)={0x4, 0x0, @raw_data=[0x4, 0x9, 0x0, 0x80000000, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffb, 0x8a, 0x1ff, 0x100000001, 0x5, 0x7, 0x5, 0x80000001, 0x1, 0x716665a4]}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000001c0)={0x2, 0x0, [{0x0, 0x1, 0x0, 0x0, @msi}, {0x0, 0x0, 0x0, 0x0, @adapter}]}) 03:02:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000003940)='/dev/mixer\x00', 0x90400, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000003980)=""/161, &(0x7f0000003a40)=0xa1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, 0x0, &(0x7f0000000080)=0x4) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r3, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:47 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x8) getsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080), &(0x7f0000000100)=0x4) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x1) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x10000, 0x400) getdents(r1, &(0x7f0000000200)=""/4096, 0x1000) 03:02:47 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x40000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockname$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) fsync(r0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000100)=@get={0x1, &(0x7f0000000000)=""/223}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x40100, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000280)=""/103) signalfd4(r0, &(0x7f0000000140)={0xfffffffffffffff7}, 0x8, 0x80000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000240)=""/28) 03:02:47 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:47 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:47 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0xc00) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x2, &(0x7f00000000c0)=0x4) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000427, 0x40) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x10000004, 0x11, r1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 03:02:47 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) inotify_init1(0x80000) [ 365.040193] net_ratelimit: 16 callbacks suppressed [ 365.040199] protocol 88fb is buggy, dev hsr_slave_0 [ 365.050779] protocol 88fb is buggy, dev hsr_slave_1 [ 365.200263] protocol 88fb is buggy, dev hsr_slave_0 [ 365.211672] protocol 88fb is buggy, dev hsr_slave_1 [ 365.280544] protocol 88fb is buggy, dev hsr_slave_0 [ 365.285779] protocol 88fb is buggy, dev hsr_slave_1 [ 365.291149] protocol 88fb is buggy, dev hsr_slave_0 [ 365.296386] protocol 88fb is buggy, dev hsr_slave_1 [ 365.840209] protocol 88fb is buggy, dev hsr_slave_0 [ 365.845484] protocol 88fb is buggy, dev hsr_slave_1 03:02:49 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:49 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(r0, r0, 0xa1059fe8563bf7d3) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x1000) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 03:02:49 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ffa000/0x3000)=nil) shmget$private(0x0, 0x4000, 0x78001002, &(0x7f0000ffa000/0x4000)=nil) 03:02:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:49 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:49 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000025c0)={0x9, 0x0, [{0x0, 0xc2, &(0x7f0000000180)=""/194}, {0x1f002, 0x1000, &(0x7f0000000280)=""/4096}, {0x2000, 0x1000, &(0x7f0000001280)=""/4096}, {0x10000, 0xac, &(0x7f0000002280)=""/172}, {0x2000, 0x88, &(0x7f0000002340)=""/136}, {0xf000, 0x58, &(0x7f00000000c0)=""/88}, {0xf000, 0x9c, &(0x7f0000002400)=""/156}, {0x6004, 0x22, &(0x7f00000024c0)=""/34}, {0x5004, 0xaa, &(0x7f0000002500)=""/170}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) bind$netrom(r1, &(0x7f0000000000)={{0x3, @bcast, 0x1}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffffffffffff93) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) 03:02:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000040)) 03:02:49 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4440, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:50 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x8, 0x5, 0x1, 0x1, 0x3, [{0x4, 0x5, 0x400, 0x0, 0x0, 0x400}, {0x5, 0xffffffffffff24f7, 0x3, 0x0, 0x0, 0x1084}, {0x9, 0x5, 0x8, 0x0, 0x0, 0x8}]}) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:50 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:50 executing program 2: clone(0x1000000, &(0x7f0000000000)="134381cf59ad29003de6d6f07f8ae09e8986089534ccc13c7f2cbca043f60104e286fc282a261fe8091ca092851629400fc35aa5af28dd307b355b6914c8d372b49a9c08c1bb02645cecc6cc35cf7f6f1f611fb0ca109f3d39215b69548140335005a03b4cbbb6a8c2643c29bc633aba189fe7ebe2b043ee4d62d2b0146cde3c52815253842e9193b10c7619634029a800ac95e3f1289655fc9ffb89d25ac1d3a75b978e4db8639eca9c7b331808c3d488310885aab40622b46d166c90b95979de6e0935c9a2979efb5e89", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="bdc7caf378697fb16555e68d15d448667903f3657fdc966552f6026d4c3b8f28de88f207868a8ee71335ae385f5e7658b3b0daa0d411fab0bfb040e3411a25a15eff1f5c927483a6cbfc9aabac983fe09ed592282267d5907bbc9f4a312cd7b90c84439294356af91279bdbc1ce3df257e4905bafed5da7a988338ebedc1a5880a1bb425faef1f293d22fb09a2ca6f4403847dd4e0214ed1ca255e434f2cd24a3f049bb9") getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000280)=0x7, &(0x7f00000002c0)=0x4) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0xc000, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000700), &(0x7f0000000740)=0x4) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000300)={"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"}) 03:02:50 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:50 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:50 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xda5e, 0x400000) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f00000000c0)=0x80000001, 0x4) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) 03:02:50 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:50 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7) read(r1, 0x0, 0xffffff1e) 03:02:50 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101400, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000000c0)={0x0, 0x42f0d1af, 0x7, {0x9, @pix_mp={0x7, 0x8, 0x34524742, 0x0, 0xd, [{0x400, 0x5}, {0x100000000, 0x8001}, {0x100000000, 0x4}, {0x2, 0x80000000}, {0x8, 0x8001}, {0x81, 0x6}, {0x8, 0x2841}, {0x2}], 0x0, 0x1e, 0x4, 0x1, 0x7}}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x800) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000300)={&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000240)=""/140, 0x8c}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000040)=0x1) 03:02:50 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0x1e, &(0x7f0000000000)=0xfffffffffffffff8, 0x4) 03:02:50 executing program 2: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000100)=""/94, &(0x7f0000000180)=0x5e) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000000)=0x1, 0x4) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r2, 0x0, 0xffffff1e) 03:02:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:51 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4400, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x171) write(r0, &(0x7f00000002c0)="220000002000070700be000009000705020000000100000000200000050013800600", 0x22) 03:02:51 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x6, 0x4) 03:02:51 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:51 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r1, 0xfffffffffffffffd) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x581002) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000040)) 03:02:51 executing program 2: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) 03:02:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:51 executing program 2: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:51 executing program 1: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:51 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0xf08, 0x0, 0x10000, 0x81}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000080)={0x7, r2}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000180)={'bond0\x00', 0xfffffffffffffffc, 0x1bc}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000140)={r3, 0x3}) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) write$binfmt_aout(r0, &(0x7f0000000000)={{0x108, 0x8, 0x1000, 0x157, 0x383, 0x3, 0xd2, 0x5}, "3b5be26f1bc016e56c880583743007f31b20131c29298d5c7615a3bc2d598c9e1406320a7b75121e7049f7308f033f1e76e486ad5d3dda412d7033fb7b0f2acf0a39814ea06a35d20f477c149419cf21d8b115c0207fdecda1bd8000f79c90e3"}, 0x80) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) r2 = socket(0x10, 0x80003, 0x2) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000080)={0x20, 0x1, 0x2, 0x8000}) 03:02:51 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000180)={@empty, r2}, 0x14) recvfrom$netrom(r1, &(0x7f00000001c0)=""/148, 0x94, 0x40000000, &(0x7f0000000280)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}, 0x48) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000300)=0x6) 03:02:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:51 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x3, 0x3, 0x4, 0x0, 0x0, [{r0, 0x0, 0xffffffff}, {r0, 0x0, 0xff}, {r0, 0x0, 0x1000}, {r0, 0x0, 0x3}]}) 03:02:52 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:52 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:52 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fstat(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in6=@remote, @in=@local}}, {{@in=@empty}, 0x0, @in6}}, 0x0) geteuid() getgid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)=0x27d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), 0x0) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000d00)={{}, {}, [{}, {0x2, 0x0, r1}, {0x2, 0x6}, {0x2, 0x6, r2}, {}], {0x4, 0x1}, [{0x8, 0x2}, {}, {0x8, 0x5}, {}], {}, {0x20, 0x2}}, 0x6c, 0x1) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x2, r5}, {0x8, 0x0, r5}, {0x8, 0x3, r5}, {0x8, 0x7, r5}, {}], {0x10, 0x6}, {0x20, 0x4}}, 0x4c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x4800) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xb, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x82, &(0x7f0000000400)=""/130, 0x0, 0x0, [], 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x3}, 0x10}, 0x70) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f0000000340)='personality\x00') 03:02:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 03:02:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:52 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x800) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 03:02:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'gretap0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000540)="030400000300600000000000fff57b016d2763bd56373780398d537500e50600591f301ee6165b9981b42580c29cd5c061e858184374a7ffe4ec55e0654786a70100935ba514d40008efa000803900002fd08d49a47eff71bc4131fe4c1f99bf00a900000000d1843e770af9", 0xffffffffffffff14, 0x0, 0x0, 0x0) 03:02:52 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x3a, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000003b40)='/dev/sequencer\x00', 0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003a00)=[{{&(0x7f0000000180)=@pppol2tpv3in6, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)=""/132, 0x84}, {&(0x7f00000002c0)=""/145, 0x91}], 0x2, &(0x7f0000000380)=""/212, 0xd4}, 0x3}, {{&(0x7f0000000480)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000500)=""/85, 0x55}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/180, 0xb4}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/75, 0x4b}], 0x5, &(0x7f0000002740)=""/42, 0x2a}, 0x7}, {{&(0x7f0000002780)=@caif=@dbg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002800)=""/89, 0x59}, {&(0x7f0000002880)=""/4096, 0x1000}, {&(0x7f0000003880)=""/149, 0x95}, {&(0x7f0000003940)=""/116, 0x74}], 0x4}}], 0x3, 0x2020, &(0x7f0000003ac0)={0x0, 0x1c9c380}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000003b00)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r2}, 0x14) r3 = syz_open_pts(r0, 0x0) ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, &(0x7f0000000040)={0x4}) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r3, 0x0, 0xffffff1e) 03:02:52 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000100)={0x80000001, 0x3, 0x9}) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:53 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000000)=0x623) 03:02:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:53 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:53 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0200eeffffff0100fa46ff0700000400000042000000000000000000000000ffffff81000000000000000a000000000000000000000000000000ffffdabe", 0x3e, 0x1c0}]) r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000c480}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x30, r1, 0x300, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x40}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:02:53 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:53 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:53 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0xa0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:53 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400202) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="b95fd687eaa1"}, 0x10) 03:02:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0)={0x200, 0x2, 0x20, 0xfffffffffffff70d}, 0x14) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)) 03:02:53 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='autogroup\x00') openat$cgroup_int(r1, &(0x7f0000000040)='cgroup.max.descendants\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r2, 0x0, 0xffffff1e) 03:02:53 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x904}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x400, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x8, @bearer=@l2={'ib', 0x3a, 'caif0\x00'}}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x80) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8"], 0x2a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000500)='./bus\x00', 0x1) ioctl$VIDIOC_S_FBUF(r2, 0x4030560b, &(0x7f0000000000)={0x8c, 0x1, &(0x7f0000000200)="f6f785ee8beb90fcb8198eb9ffd043f6f025dc91718e41a58e008082752fb2e21e2318286e0826e2f49f2b0c54c03a9f457bf8e1c66bb266c06fa88f340ace8d86797984a0e4e4af50", {0x34, 0x2, 0x34343459, 0x7, 0x401, 0x200, 0x5, 0x5}}) read$rfkill(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000300)={0x2, @raw_data="be5218696baf814893673a06d15df9a70e2d56e712ffccd03751613223ab5ed914c7b70996d518c1a945759df113953dd8658b8c631046c6b79f2f78efe50746e5bc7ed8e3bbf29620b2c7e057c4ef1db6a5de583121683785bf78bc451d7c61ba1057e205c8c69d4504cf690ddcf8ad7a6b7ee74c7293cf86667e56a36435f8c75f7925baea364c91f1f3cdd44256d59c881dbfa5699aa20eecc6ac96282eb2198c0201b6d92689f69a5db7c570d2d065199e4695ed6d138ce0e5734af4ba09d004733149658f23"}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) 03:02:54 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:54 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f00000001c0)=0xe03, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6c, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="030102000000001f00c754a1762955544013017bd69653f7f071c4f5161dafab492bdf8fa4a9b9a56a6bf29f008a329155014cbd7aae5f4d31bddc5df8c6dcb9c5948f2ab84cf310585c0b6215d2a0563d9b9d8cff1e6675a16c54a2847b3a6eb70bf167ce7376a9591038819bcb3a22488e03a67719b131b5c8216694904ef7a6ebea5b65070646f411fa440f881b4280486d569f0587a7195485668ca7607e460210ccf85e544d8e0fca7fafe6299bd99cda8586d4918b9812fa040eac307f20a948805e8d65ca55b974a8e1d0844b0fd651dcaba6d85b34cde2b0916abf3db148"], 0xd1, 0x0) 03:02:54 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8"], 0x2a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 370.240131] net_ratelimit: 24 callbacks suppressed [ 370.240137] protocol 88fb is buggy, dev hsr_slave_0 [ 370.250841] protocol 88fb is buggy, dev hsr_slave_1 03:02:54 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:54 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x80200) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in=@multicast1, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x7, 0x80902) 03:02:54 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xcd495a139896f44a, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x74, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2e}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5e}, @FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x14) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:54 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1f) 03:02:54 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8"], 0x2a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d24000)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @multicast1}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e23, @local}], 0x10) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:54 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:54 executing program 2: getpgrp(0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x9, 0x1}, 0x0, 0x0, &(0x7f0000000040)={0x3, 0x7, 0x2, 0xe7}, &(0x7f0000000140)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xffff}}, 0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000300)={0x6, 0x401, 0x9}, 0xc) 03:02:54 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x8000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001300)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={r2, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0xc) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1}, 0xfffffffffffffffc) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000100)=@gcm_128={{}, "2b0b85fdb943f70a", "50247ffcdf471cbfa81e9053c68e242f", "c4ff698e", "058cbb5e6d036551"}, 0x28) 03:02:55 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8001, 0x0) ioctl$PPPIOCDISCONN(r2, 0x7439) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:55 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005"], 0x3f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:55 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:55 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x5e, @multicast1, 0x4e21, 0x3, 'sh\x00', 0x20, 0x100000001, 0x5}, 0x2c) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000240)=0x800) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000100)=""/96) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000000c0)={0x3a, @empty, 0x4e21, 0x2, 'sed\x00', 0x30, 0x9, 0x73}, 0x2c) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000080)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000180)=""/161) 03:02:55 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x8000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001300)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={r2, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, 0xc) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1}, 0xfffffffffffffffc) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000100)=@gcm_128={{}, "2b0b85fdb943f70a", "50247ffcdf471cbfa81e9053c68e242f", "c4ff698e", "058cbb5e6d036551"}, 0x28) [ 371.280116] protocol 88fb is buggy, dev hsr_slave_0 [ 371.285810] protocol 88fb is buggy, dev hsr_slave_1 [ 371.375379] Unknown ioctl 1074033753 [ 371.401954] Unknown ioctl -2146413349 [ 371.414422] Unknown ioctl 35298 [ 371.436226] Unknown ioctl -2146413349 03:02:55 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 371.450140] protocol 88fb is buggy, dev hsr_slave_0 [ 371.455260] protocol 88fb is buggy, dev hsr_slave_1 [ 371.459753] Unknown ioctl 1074033753 [ 371.473830] Unknown ioctl -2146413349 [ 371.493203] Unknown ioctl 35298 [ 371.496885] Unknown ioctl -2146413349 03:02:55 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x0, @multicast2}}}, 0x84) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x1) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) setpriority(0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x0, 0x732d, @local, 0x6}, {0xa, 0x0, 0xffffffffffff8001, @empty, 0x1ff}, 0x0, [0xca0, 0x0, 0x1, 0x0, 0x0, 0x8001]}, 0x5c) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000100)=[&(0x7f0000000700)='\x10\x00\x00\x00\x00', 0x0]) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x1d3, 0x0}, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) clone(0x200, &(0x7f0000000000)="f5300ebccb683c84d7743b40ac408e58667558a7f09ce77e164b1dd45f2266486e1c6e833042a47919674113e3dd2c91cfd762707546695333387dc6d92ce8858d4d53e1ddf839b6945436870df97514e54a2ff8a8efe9523e583b8534202f519b91dd25f99049f3294c2a5a67da7bbfb9d979ba604ffcdb9b79eaad81daea62ec5f3262fe29cfb089005200791b2b00d5a277372911461ab90e6c2295faf578fd455dae852df64b2733b42c54b305b10849c3cc13cb4392aa35666204c2a9e9319c47", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="f5abbbda54f4e9c64fdcdfbb322b29f32680c0442eb583ea72d9772dc34c5a1246a511e22c128d240f01141833efaa3ec785728ab9fb189d1b768781deec0820264be842c7d6228819efba925521dcfc9c6e81bd64ed92e4bb3f1277f8ca723b4bec034aacb3f6fa957c44453376ca63de8e020fd7848e4f985efba9dc12f75d71e37ba2772d161f040f2780783c6aeb3706619be859dc8e613eddcb23ad276eb3ff58a074de2d6d124e0c3cb5c7da80d26a2e58ee24ad85db096f89def52022f28e5b2526659f221dc6087136275d6edebc24") [ 371.520103] protocol 88fb is buggy, dev hsr_slave_0 [ 371.525485] protocol 88fb is buggy, dev hsr_slave_1 [ 371.530642] protocol 88fb is buggy, dev hsr_slave_0 [ 371.535723] protocol 88fb is buggy, dev hsr_slave_1 03:02:55 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:55 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005"], 0x3f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x800) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r3 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000001740)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000001780)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000003440)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002dc0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@dev}}, &(0x7f0000002ec0)=0xe8) stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0)={0x0}, &(0x7f0000003000)=0xc) r10 = geteuid() getgroups(0x4, &(0x7f0000003040)=[0xee00, 0xee01, 0xffffffffffffffff, 0x0]) r12 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003080)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003180)=0xe8) fstat(r1, &(0x7f00000031c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000003340)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc, &(0x7f0000002d00)=[{&(0x7f00000000c0)={0x18, 0x2f, 0x5, 0x70bd29, 0x25dfdbff, "", [@typed={0x8, 0x14, @pid=r3}]}, 0x18}, {&(0x7f0000000180)={0x240, 0x1f, 0x1, 0x70bd27, 0x25dfdbfb, "", [@nested={0x1b4, 0x77, [@typed={0x14, 0x11, @ipv6=@loopback}, @typed={0xc0, 0x71, @binary="98ce70d851b3c4612750f40c18236cf874bb237066a183d0c9e49713f23df201e54dc72fa7e287749c83fa9baf231d89a9bf24b097dcda7beac0266b5ced814a9a99db66498be73ca2d9b975c86131ebfea72351d5e656db7f51d92dcea31a88ce85a24d3c5ea55c82126385743653bfaa3bf267264a68a01d21d05f4d146302225d1babcf1913028d88b1ebafd8f316f2772b4493ad4a5dd9aeb24b8c8a03e0dec817c25942400f31317256e2797339baaaf741b9fa21738ecd"}, @typed={0x14, 0x7a, @ipv6=@empty}, @typed={0xc, 0x43, @u64=0x6}, @generic="729ff6207d6095c19d0b2fd8c9102b7f09d0af3d944b1cec00b4460aa7b775388287c61d717cba68848ecb9675681486026e86ae5a8dc6a58acaa409424bac42f3aca2186cc424cb10bbb360104d8bb813a1fa55dae7cd41a75fc66e1e2c7960262e59dd3f3967b1bdeb0810a20ba330b9cbc15094e61dabeaf4eec63e21e20d6e43045989e2d013e34356b30c2182fa4e79278ca50c4295968d4f52b3d36a1716047e3c57f6f9b1dbbd39e787d54456a72e6cd5", @generic, @typed={0x8, 0x2a, @ipv4=@dev={0xac, 0x14, 0x14, 0x24}}]}, @generic="2425a090e341e28e8731d472daf0023a193934d4e76476a6dc8d30f84b6dc7e381bbeed6c7992e48380a6dcd7d62f92527249d67b67a0adf36a87adb92b107bb76e6c1266b206ceca18df9e8e961bdd419273c502fd711c35ddd89913dfb51d6ac8b6c6f315b9cda6a6fb28ee3a8d24e54d194d353b2cff47080"]}, 0x240}, {&(0x7f00000003c0)={0x1358, 0x24, 0x102, 0x70bd28, 0x25dfdbfc, "", [@nested={0x1004, 0x11, [@generic="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"]}, @typed={0x14, 0x18, @ipv6=@mcast2}, @generic="be830aa902d6fde37792c3478096b0e43caba4c195ccf57f5ba0a9a3090eae608f5d9a5000d337be1d48f15274f74815af225cae8b0cf70751e488680dbee5424bd808b4447688e1bdaa7f1ca0e869bc27f886d8944a252a8a52cd0671fea940736268959cd8da678c90ed644835e5225e9af305577de46fa5adf7be26fb0a7a3dc2c5ce7ded076c5220af2cea7703474f6d8f71575873d8f787cecb51", @typed={0x8, 0x71, @u32=0x1}, @typed={0xc, 0x9, @u64=0xffffffff80000000}, @typed={0x8, 0x18, @u32=0x9}, @nested={0x18c, 0x1d, [@typed={0xc, 0x70, @u64=0x1ff}, @typed={0xc, 0x45, @u64=0x1}, @typed={0xc, 0x73, @u64=0x7}, @typed={0x8, 0x46, @str=')^\x00'}, @generic="e571a23b26b4b2b05f06b0a50b6563e275f3c4face229a698b53f871055818657012613339179c5b4a86da1520fb3aba9f8980df33fe3fdb11623fc83e3083270e4be94b7d406fdd726f9d290ba0ed3838e38af9c4e75a8a30085e6be8bf61ea9b8a89af48", @typed={0x8, 0x5a, @fd=r1}, @generic="ffca0899336af91f071306bb9e0601e8f492e931a48e42ceb6aeea1fed6f16edf3ef0cbfda39a9fd8e961d13d0828a96ccf9a75963c25bc6297e99b47f170e81d2e9268c684646c827bc5e986753a9beaa8328c29ec26668d4650103f62f6871741c202e967963aa3af7560f1b8edc4f4569845ce86abe30ad12925826a24f9b971869315380c693db8210dd7ad3123916ee6d4a193a4ad16eff8f7f11bef90d7936ead2c4bf9608aee1dc3b11c22d4951e341ff98506d0b51963f80894c24a2979e10aedab1572279658e130e3c218ecb739bfd5e1c0b419f3b14fab9d19369e12d25ac881731", @typed={0x8, 0x21, @fd=r0}]}, @generic="e8cb595f3e1f7d7f328dddfda791b8a3f7d40b8a95a261378b66d11aa5e40d53713b1f3d9590f5c3661d22a2d15e4f11292b66d618dbd87572ba7588ec9c2f7f2243ce45d569fda9a3bde6d2cbb11c06f357c7b2430dee3f6176d5347ddd64634e2e14c3b52f29b0b8167f9435adcb78302e34bec1483df98ac4fab94d8b618cd9bc053d6fd57f6497df30cb14511f72a1352dab5fa4faaff0d5bf8d3597bcfd6e3142e7109c88b6ee6c2663bdced0a44b824c259c092cbfd6b3170d89c506593da85fb9073da65ae1ab487401ae960642d3203a40ce40096c04eba4dae7729aaf0309abc82ea47406"]}, 0x1358}, {&(0x7f00000017c0)={0x14ec, 0x24, 0x10, 0x70bd2c, 0x25dfdbfd, "", [@nested={0x1388, 0x39, [@generic="3d5eb75785ee9194c0161543ec0229d1ea2c85cf5c01c00c450419e5bf1fb6b1045d6e19b7040f4f689fe2413bc180c755727705141058fdb43a704627608880aeb705375399342c6c2f75bf869464f2e0720d29b3cca76e5dd4ff857697ce484d1cd7bcebc7b6baff74271edf700772fcea6cac672b68a1b2eea95a4a3cc583b994d38de84fe62175fdc5bcaa8335fdfc562af95879c7ff5792775b232543b4f96aa46e34ef09982ad0e6e6916f66b2ea208b9d0c23ee3e258c2aa9f39dd3a15399b15d4cc1e9befb8ede860b7e710104ce4cd22766abbc9f83bc4419c61a7597", @generic="0c1e4819911ce6dae46e9fcce0e5b6496fb2b8656987f10866a14449416b1e7595f55869e72d3af7a17424aaec8ef5f7d70e3bb63658b425f2c7b481f3639114e36a3de29a1177b5e31e3bc1f2a399831371d6a3b949cd07edc4d9b1fa4b73974eedf2e091bcacb930102ce2dfedd682b68626112a13c02e637d69707d75156e603e32798903b90cd9e8d3ed86e3adcc7f51e5d85cd1d2762f099c6d4814c54521dae5de299e8bd9da6d7f94c88ffdd1378c0ccdf441aee1c29edafcb03f631838b9f09c34d46fdbbf72545878af99ce1fed06882d607eb25e", @typed={0x8, 0x24, @ipv4=@broadcast}, @generic="8c35cd5ad9dec36e30c1e4a11a890fdffdf9acb49fad63", @generic="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", @generic="0b5d4b01da066cfe1c2eaa7e46ca6ed868ca80fb3383ac1b7fafac808bbf5a04bfdfbc2b0eacda1e3b1234335a4b32af9a3cf475693b8a50", @generic="9b9aa490797d9b86c23d90e87679fb63089ae4f6663c75b3d23d394dce31170c22d7bdcebb7bf1541827b6773385cc2e367f5f3f3559702c674c0339a61ebf49d14aa68eeb6764e87bcc2a4db5d1aa128e495c760c13bd52bc5f75945f0edf26792b4343a42aced8a6fe1aa56fed7c3557e391a005780d7817b9e9019fcb1e", @generic="f9f03a04ef705d50cc7a63b133a7fa3ba45069e584d156e9623f3b8bd7fc214d2093075ff964014c06d869a135fe78629ecc2a73b97d7dc97d08a9dbbd61c8a44992c6b0b14b181eb5ef0b4b2e8830b31f1fbb161526c7641388b0df622d5c71fb24321d0a74776cd790c23f5676294a2850fb7a41a6f428f095c04efe2ff5d131a91ace294aab5894c9dc3abb898fe40cba751abad631defdc93344ad2c7def9bb71f1d90f618f89f3bf97e5bea351557abd2b1a403229bd844913bfac1bfa249bc29530da9d3afe721db11fdabcb2869ec6d13e1debf68cc22305b430aba970521c4cc45e4424ab9a7165fab7751caa4e2c411"]}, @typed={0x8, 0x7d, @pid=r4}, @typed={0xa0, 0x43, @binary="f707bf221ca012f9cf64387fa716b525ea917e447523a28419486b8a5927328336b93468504b9e225598a8663f74352ccfb47db64d273998c0c71d7fb3359fe6414e62ac44cf35fa6ca65b3fda073a4d30768525505f58de3f53add75a619530ea34ee132802fde3f41f9e36e08a5e1526ef299a87f5a78e35bf556265a003b213821b221eae2193a6b357faad45c6d366bbb1384afce661ef2c7247"}, @generic="e99e8c2a9ca4babba82bdc75f56f5b6bb16ed011cf75f780a46f2e1b0ad4f957", @generic="120f39387e069099466fb8e2690999a41c4f50429b2cbe4ca59e8d6c5d3a7f17217c9788d82e6cce4e0e99605db565bbc5eb788f7d9818cbecbd3f62f3907067c09c8cdc8bbd72c9d737b44b85ac8573d4e96fd171bc0b5dad95f5b42a7377a6f0f4d9d43282aa9373afcdfd52005cdcb84e0ec0391b58ad7b3a0745ec42a4e76d66b8", @typed={0x8, 0x67, @pid=r5}]}, 0x14ec}, {&(0x7f0000002cc0)={0x20, 0x1b, 0x20, 0x70bd26, 0x25dfdbff, "", [@typed={0x10, 0x3d, @str='[system!!\x00'}]}, 0x20}], 0x5, &(0x7f0000003240)=[@cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x2c, 0x1, 0x1, [r1, r0, r1, r1, r1, r0, r0]}}, @rights={{0x1c, 0x1, 0x1, [r1, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}], 0xc8}, 0x4000000) r15 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r15, 0x54a2) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:55 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x9, 0x40000) 03:02:55 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:55 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x80002, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000200)={0x2a, 0x29, 0x1, {0x3, [{{0x12, 0x2, 0x8}, 0x7fff, 0x7f, 0x7, './file0'}]}}, 0x2a) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1f6, 0x40) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4012002}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048844) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000180)={0x7fffffff, 0x0, 0x8, 0x8001, 0x2}) 03:02:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1b, 0x121800) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) sendto$netrom(r2, &(0x7f0000000080)="8281c731e4f1", 0x6, 0x800, &(0x7f00000000c0)={{0x3, @default, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 03:02:56 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8"], 0x2a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:56 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@tipc=@id, &(0x7f0000000080)=0x80, 0xacd99543a7b27aa9) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000000c0), 0x4) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x30001, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000480)=ANY=[@ANYBLOB="5e00000000403a6b8201269f66b8bb6bc00d0000938282816613d273d30fa7d6fcde09f7cce8b35e6f88a827d99b3968d32c1a44305b66aa1b4e42e6af6baecbae88739513b74d3209850a0800e575f953d10e26ded6f3f1381ef2d0b6432916b50bdbf2fcd512fcf1baacc9a72298fb4ff4d61907bb1bdbc52d07fd19a65c449be57fd7e318d189863accb2721d390000000000"]) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000400)=r4) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x7fff, 0x200000) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f0000000140)={{0x3000, 0xd000, 0x1f, 0x7, 0x81, 0x5, 0x1, 0x6, 0x100000000, 0x73b2, 0x5afd, 0x1f}, {0x100000, 0x1000, 0xd, 0x0, 0x20, 0x0, 0x7, 0x3, 0x3, 0x7, 0x5ce8, 0x9f}, {0x6000, 0x4001, 0xb, 0x4, 0xffffffff00000000, 0x40, 0x7, 0xff, 0x1, 0x7, 0x1ac, 0x8}, {0x11f001, 0x0, 0x0, 0xf8a9, 0x2, 0x6, 0x0, 0x2, 0x40, 0x3, 0x0, 0xffffffffffff6ab3}, {0x1000, 0xf000, 0xe, 0x4, 0x625, 0xffff, 0xfffffffffffffffb, 0x1, 0x401, 0x7, 0x7ff, 0x8000}, {0x4, 0x104004, 0xf, 0xc0, 0x7f, 0x80000000, 0x0, 0x65, 0x100, 0x6, 0x7, 0xffffffffffff8001}, {0x7000, 0x1f000, 0xf, 0x9, 0x4, 0x8, 0xffffffffffffff00, 0x6, 0x74, 0x20, 0x9, 0xffffffff}, {0x13000, 0x1000, 0x1f, 0x3, 0x0, 0x3, 0x20, 0x81, 0x18d0000000, 0x3, 0xa995, 0x1}, {}, {0x10000, 0x3000}, 0x5, 0x0, 0x100000, 0x0, 0x9, 0x2800, 0x100000, [0x9, 0x7, 0x8, 0x7fffffff]}) 03:02:56 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB]}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000040)) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x114}) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000100)={r2, 0x7ffff, r3}) socket$netlink(0x10, 0x3, 0x7) 03:02:56 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8"], 0x2a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005"], 0x3f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x320, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8001) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCCBRK(r3, 0x5428) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r3, 0x0, 0xffffff1e) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000000)) 03:02:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="62ffcda253b8f397b80ceee49bcb48f747d626bec672c6734d2eb1265cc8e9b23e2097108127f6c3468427573f006a3baf5508e72e816b8838f58baffb4ea8b0c2e52bd96a15da70b54acb9f1b7a267a3d1db68e1850d24dbcd9be7e567c058a51cfcdf6ac1cf7a6a608652921e6a10052723d5f5f052dcada1dc9f35ec395d760c398241853729134a09e84efdca731151f", 0x92}, {&(0x7f0000000200)="c1b41885787a23fc94b63f71a6437b7c4b7da678820af4f94ee98b75fd418409fe876cceeccff6293d4ad7641531ceb022aeb919a71fe456a19c87612a3d367c0e616050fb115ff96514096ed267d7918cd5013969c84ec5c9b7a48fdc10f87003cf619870", 0x65, 0x3ff}, {&(0x7f0000000280)="6996f4985867ebd8cf3d6fe7e17647286c4382b4117c971a3dce60dee1daa238f47a4b485783a064cf311504afe20aae3190f9f644915e71335dd9fad9ba847ffb39c119f2b2b8ffd763b6f4a0ddaa37975d4a14a41c82b97b28d2420077d7cdaa95e80e4a1a65e2195dc5a2dd9e8219d6b09dd52fdc6448aa07cc64945cc267796ef6c7ab5f857c998cf1ca7a9eb859643ca7ca3d04f019a79d2807f87449d95340c3a7221119eda278d3263b0d344cd0f18d19982430c1d2550e87d2bac8ea0ccd01f31d8e216c911eb765836cf48754ff2d5cfcd4cff3fef9738db1aeffac596cb2da65862919cc", 0xe9, 0x2e66ad85}], 0x2, &(0x7f0000000400)='/dev/vcs#\x00') setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000440)=0x2, 0x1) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9d1, 0x10000) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, 0x4, {0x7, 0x1f, 0x3, 0xe87588d97dc101b8, 0x0, 0x5, 0x7, 0x6}}, 0x50) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x100000000, 0x6, 0x10000, 0x1}]}, 0x10) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:56 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:56 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 03:02:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) 03:02:57 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e019"], 0x4a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5b50, 0x100) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r2, 0x1}, &(0x7f0000000180)=0x8) [ 373.168093] audit: type=1800 audit(1565233377.086:87): pid=19872 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17665 res=0 03:02:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = socket(0x4, 0x7, 0x7) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r2, 0x8, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x810}, 0x40) socket$netlink(0x10, 0x3, 0xf) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2200000019e901cffe53e53585c27a682ba688c191f896c785968371b3454984e9d4674e8c1e379b32b40f1b750d036e733810d5cd46824527f415a4dd1b0be5643ad6839351a2b2b990dc5630f8d6145ada88d0be11ce8b803d8572575dab486230316bacab33c566229d920b78d349363da4b82eb3c6d658511c866aa17afdd1fae86e1795c3846187ec587af9de99f47358a7dfc7118658c2ac62a93e6101bbf14254d75cbd85bd1f317b363042c262bfdbb53bf3239f312504bc9e2e69bad5c242dc7acba3c5e8871f5fb6a2a8988167434b279c89782ab3891540772ee84d58dd377c5cd638a1", @ANYRES16=r3, @ANYBLOB="010029bd7000fbdbdf25050000000c0006000300000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x880}, 0x1) [ 373.297245] audit: type=1804 audit(1565233377.116:88): pid=19872 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir737750272/syzkaller.RL8fCE/526/file0" dev="sda1" ino=17665 res=1 03:02:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:57 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8"], 0x2a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) write$FUSE_ATTR(r1, &(0x7f0000000200)={0x78, 0xfffffffffffffff5, 0x7, {0x401, 0x8, 0x0, {0x0, 0xdfe, 0x1, 0x5, 0x8000, 0x80, 0x800, 0x8, 0x3, 0x1, 0x4, r2, r3, 0x3, 0x4}}}, 0x78) 03:02:57 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e019"], 0x4a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x141000, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0xfffffffffffffe56, 0x803) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:02:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x20040, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000200)={0x5, 0x8, 0x46, 0x100000000, 0x7}) r1 = epoll_create1(0x0) r2 = epoll_create1(0x80000) close(r1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000040)=[r3]) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) socket$inet(0x2, 0x800, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000000c0)) 03:02:57 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x3c1c00, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)="454e0335c495b917c1e1f21e09160bb35a7664919581ef38a2c31158b0ce0b989a60fdd33d587f42a9be5b75292bee7de32e4acd287e22a2223eeb703b8d96b479ce491041e640c284c7704a967b9d83cba29d867c6b4db479a3d6884fdf5170fd622a163d74edfca9d1d6478e0995fbc6478adf878db3577a08ba14afe5cc0b9c99b6ff9e04e5f8cb2ce8648a93c4a35d7d007e35253aac9ed97fdfd3b3a7f46fbfe7a9e835b2add6ab3e4b428a654bac147226394e8b1ea5c5c93e4d2c73db1c4b31b6a6290d3032b9a66b29d5281425bc72a00599ee0f1fb2d634c5d9a79b9267dcc47228877f0c"}, 0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:57 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:57 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005"], 0x3f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:57 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e019"], 0x4a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:57 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/15, 0xf}, {0x0}], 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90100000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c8080000", @ANYRES16=r3, @ANYBLOB="200128bd7000fedbdf250b0000000800060039090000080005007f0000001c0001000800010000000000080009005100000008000900800000007c00030014000600fe800000000000000000000000000024080003000400000014000200626f6e645f736c6176655f30000000000800080006000000080008000000000014000600ff020000000000000000000000000001080007004e220000080001000000000014000600fe8800000000000000000000000001010c0003000800080000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x8810}, 0x2004c080) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:57 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e019"], 0x4a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:58 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)={0x7, {0x3, 0xc6, 0x3a2, 0x400}}) 03:02:58 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f01000000"], 0x4f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:58 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005"], 0x3f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:58 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x10185, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000040)=0x1) 03:02:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x800, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f0000000380)={0x78, 0x0, 0x2, {0x0, 0xffffffff, 0x0, {0x6, 0xfffffffffffffdd1, 0x7, 0x80000000, 0x3f, 0x8000, 0x0, 0x1f, 0x5, 0x0, 0x1, r4, r5, 0x7}}}, 0x78) futex(&(0x7f000000cffc)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r6 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4200000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000480)={0x110, r7, 0x10, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0xf4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000640)={0x0, 0x0, [0x401, 0x9, 0x8, 0x1]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r6) 03:02:58 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f00000003c0)=""/44, &(0x7f0000000400)=0x2c) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:58 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f01000000"], 0x4f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:58 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:02:58 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:58 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x10100, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e24, 0x5, @mcast2, 0x10001}, {0xa, 0x4e23, 0x8000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}, 0x800, [0x1, 0x6, 0x100, 0x8000000000000000, 0x81, 0x6, 0x287c, 0x2008000000]}, 0x5c) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000080)={{0x6, @addr=0x9}, "c4c319108ada3d0381d8b26fcd3d1e8fd271611add58d34f628b9611f23b59b8", 0x2}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xd0, 0x0, 0x3) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000200)={0x1, 0x0, 0x102, 0x1, {0xfffffffffffffff7, 0x3, 0x38}}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x9, @mcast1, 0x20}, 0x1c) 03:02:58 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x10001, 0x2, 0x8, 0x1, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x3}, 0x8) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:59 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005"], 0x3f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x800) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40810210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x20, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9176}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@broadcast, @link_local={0x7, 0x80, 0xc2, 0x4}, [], {@ipv6={0x86dd, {0x0, 0x6, '\\:T', 0x14, 0x2f, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x608]}, @mcast2, {[], @tcp={{0x0, 0x883e, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:02:59 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x141200, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000040)=""/173) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x40, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000140)) ioctl$CAPI_INSTALLED(r1, 0x80024322) 03:02:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000016c0)='syz_tun\x00', 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) r1 = socket$inet_udplite(0x2, 0x2, 0x88) listen(r0, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80000, 0x0) sendmsg$nl_generic(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8a400a4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x3f, 0x800, 0x70bd27, 0x25dfdbff, {0x9}, [@nested={0x50, 0x79, [@typed={0xc, 0x5e, @u64=0x100000001}, @generic="2907014d0100f36d2cb0a6d6472c70b39b3e8f9d4222521f9a828d429f9668a63a92d1cd4f1373284449e9c5a39501e42753d2c745", @typed={0x8, 0x23, @ipv4=@dev={0xac, 0x14, 0x14, 0x27}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4000) listen(r0, 0x0) syz_emit_ethernet(0xfe27, &(0x7f0000000240)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 03:02:59 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3f, 0x200) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) [ 375.385861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 375.440453] net_ratelimit: 18 callbacks suppressed [ 375.440492] protocol 88fb is buggy, dev hsr_slave_0 [ 375.450887] protocol 88fb is buggy, dev hsr_slave_1 [ 375.600117] protocol 88fb is buggy, dev hsr_slave_0 [ 375.605243] protocol 88fb is buggy, dev hsr_slave_1 03:02:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2000000000103d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000080)={0xfffffffffffffeff, 0x9, "ac1868250359a68e40"}) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) flock(r2, 0x4) read(r1, 0x0, 0xffffff1e) 03:02:59 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e20, @empty}}) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xfd4f) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f0000000080)=0x200006d26, 0x4) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x10200, 0x0) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000200)={0x1, "f1e91770ea0caa65701c637c69557ddddc0d370ba0b9ff39a541ce5fa5635624", 0x3, 0x2, 0xbc3, 0xd, 0x5}) read(r0, &(0x7f0000000140)=""/165, 0x1000000eb) 03:02:59 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e019"], 0x4a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:59 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f01000000"], 0x4f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:59 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) [ 375.680105] protocol 88fb is buggy, dev hsr_slave_0 [ 375.685382] protocol 88fb is buggy, dev hsr_slave_1 [ 375.690751] protocol 88fb is buggy, dev hsr_slave_0 [ 375.696061] protocol 88fb is buggy, dev hsr_slave_1 03:02:59 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0xc) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) dup2(r1, r0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0x100}, 0x2) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) 03:02:59 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r1, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x20}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x7]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x700}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7fffffff}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x40840}, 0x1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7ff, 0xfffffffffffffffd) write$P9_RXATTRWALK(r0, &(0x7f0000000400)={0xf, 0x1f, 0x1, 0x9}, 0xf) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x400) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, 0x0, 0xb6) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) write$P9_RSTATu(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="740000aa3501000d0052004000ffff000401000000020000000000f0ff00000100ffffffff050000000200000000f715000a002f6465762f64722f6d69646b230073656c696e7578240d00736563757269747970726f630004c53a000014482d48c913d7d5663b2e4f3d1cf54d4bb7a95ead23cbbfa3334af9b27e8cc956c97951a79babd7c9f6346582bb1537bfa5", @ANYRES32, @ANYRES32=r1, @ANYRES32=r2], 0x74) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, &(0x7f0000000000)={0x6, 0x0, 0x301f, 0x0, 0x0, 0x0, 0x5}) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd1100fea000000000000000000000000000bbfe8000"/44], 0x0) unshare(0x40000000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000440)) pause() 03:02:59 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000001040)=""/4096, &(0x7f0000001000)=0x1000) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:02:59 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e019"], 0x4a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:02:59 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x100, 0x502) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/218) [ 376.219166] IPVS: ftp: loaded support on port[0] = 21 [ 376.240104] protocol 88fb is buggy, dev hsr_slave_0 [ 376.245267] protocol 88fb is buggy, dev hsr_slave_1 03:03:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) prctl$PR_GET_FP_MODE(0x2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f0000000280)="37b769120b9de5227d23e9a12edc1ff61192a0cda3d0c3a5038131b049c7abadf1202d49c5815dd9351f44fe4475466c7c0b7c464025aac2980f50b8b149a287e6e4bdac7209011393de1a60200d861bb3ab1d489b1f92d1e49e6c8b28568920be72669b81402ce0827a4508e794c16a109e527c3c5074c5207ffc8d3a78cf11742299efbd75dafbec317d9970d35db843ec5e8e94d81790f48c23c9f40ba47b299b02a7d1b80df1df2e682ce5adf1f1f1b5a1c7bef7eb8f990fd2738e91468603157cd014a8b0ad30ba21524a9c89a88c4b", 0xd2) r1 = syz_open_pts(r0, 0x2) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200801, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2004400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xdc, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x885}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x80}, 0x20000800) 03:03:00 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fc"], 0x52}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:00 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000240)={0x0, 0xffff, 0x91f, [], &(0x7f0000000200)=0x100000000}) clock_getres(0x1, &(0x7f00000000c0)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) pwrite64(r1, &(0x7f0000000000)="772129f84ce2805cff78c2e5028cd5a4a6de74b8808179398f6b5494c3cb0fc08ea3d1c13e49d7763d158d984ddd4707561f02ee5988d818cc16b4acb78c6c7269a7181a17cedf62a8b6a19d6c8bfbf3ba84c029b8c75f09dfefce4afd7626e653224ebbe22ee3449025de4939a117f0ee6e635a6476b2899bb45c063cd4b3cc3f", 0x81, 0x3) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, @bcast, @rose={'rose', 0x0}, 0x6, 'syz1\x00', @default, 0xffffffff, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}) 03:03:00 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e019"], 0x4a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:00 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000013) 03:03:00 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000100)=0xc69, 0x4) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:03:00 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) 03:03:00 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f01000000"], 0x4f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:01 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fc"], 0x52}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:01 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fc"], 0x52}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:01 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000200)={0x3, 0x1, [0x6bab, 0x60d0, 0x1f, 0x3, 0x400, 0x6]}) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) pause() bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000040)="4e1962a9624d331bf45331e9ed481c7436b3f7c01346cb9d557360749a68cbb7d22df1a7542332bed139", &(0x7f0000000080)=""/247}, 0x18) 03:03:01 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f01000000"], 0x4f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:03:01 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fc"], 0x52}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:01 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f01000000"], 0x4f}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:01 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0"], 0x53}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2000000000103d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000080)={0xfffffffffffffeff, 0x9, "ac1868250359a68e40"}) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) flock(r2, 0x4) read(r1, 0x0, 0xffffff1e) 03:03:03 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x282000, 0x0) 03:03:03 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000013) 03:03:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0"], 0x53}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:03 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fc"], 0x52}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffc8c4, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xb03, 0x9d52, 0x1, 0xcf}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r3, 0x0, 0xffffff1e) ioctl$KDSETMODE(r3, 0x4b3a, 0x2) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000001c0)=0x2, 0x4) 03:03:03 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:03:03 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$packet(0x11, 0xfffffffffffffffc, 0x300) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:03:03 executing program 2: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:03:03 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fc"], 0x52}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0"], 0x53}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:03 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000002700)=[{{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/63, 0x3f}, {&(0x7f00000000c0)=""/71, 0x47}, {&(0x7f0000000140)=""/35, 0x23}], 0x3, &(0x7f00000001c0)=""/191, 0xbf}, 0x9}, {{&(0x7f0000000280)=@ipx, 0x80, &(0x7f0000000700)=[{&(0x7f0000000300)=""/6, 0x6}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000000380)=""/18, 0x12}, {&(0x7f00000003c0)=""/107, 0x6b}, {&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/2, 0x2}, {&(0x7f0000000540)=""/200, 0xffffffffffffff1a}, {&(0x7f0000000640)=""/141, 0x8d}], 0x8, &(0x7f0000000780)=""/94, 0x5e}, 0x5a28fcc1}, {{&(0x7f0000000800)=@nfc_llcp, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000880)=""/40, 0x28}, {&(0x7f00000008c0)=""/37, 0x25}, {&(0x7f0000000900)=""/72, 0x48}, {&(0x7f0000000980)=""/243, 0xf3}, {&(0x7f0000000a80)=""/4, 0x4}], 0x321, &(0x7f0000000b40)=""/36, 0x24}, 0x40}, {{&(0x7f0000000b80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000c00)=""/23, 0x17}, {&(0x7f0000000c40)=""/130, 0x82}, {&(0x7f0000000d00)=""/137, 0x89}, {&(0x7f0000000dc0)=""/183, 0xb7}, {&(0x7f0000002ac0)=""/40, 0x28}, {&(0x7f0000000ec0)=""/77, 0x4d}, {&(0x7f0000000f40)=""/105, 0x69}], 0x7}, 0x5}, {{&(0x7f0000001040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000021c0)=[{&(0x7f00000010c0)=""/20, 0x14}, {&(0x7f0000001100)=""/154, 0x9a}, {&(0x7f00000011c0)=""/4096, 0x1000}], 0x3, &(0x7f0000002200)=""/6, 0x6}, 0x5}, {{&(0x7f0000002240)=@caif=@util, 0x80, &(0x7f0000002680)=[{&(0x7f00000022c0)=""/37, 0x25}, {&(0x7f0000002300)=""/95, 0x5f}, {&(0x7f0000002380)=""/254, 0xfe}, {&(0x7f0000002480)=""/202, 0xca}, {&(0x7f0000002580)=""/84, 0x54}, {&(0x7f0000002600)=""/40, 0x28}, {&(0x7f0000002640)=""/47, 0x2f}], 0x7}, 0x9}], 0x6, 0x10002, &(0x7f0000002880)={0x0, 0x1c9c380}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000028c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="180000000f5c969a0dd5c873bdb43653f62caa96693581e900b0d3cf"], &(0x7f0000002900)=0x20) setxattr$trusted_overlay_nlink(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)='trusted.overlay.nlink\x00', &(0x7f0000002a00)={'U+', 0x6}, 0x28, 0xccdef1786c7757c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000002a40)={0x0, 0x1b, "a2e6753782ac4d2049923911ad1dcff7ae559cd279dd2b07c3e69d"}, &(0x7f0000002a80)=0x23) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000002940)={r3, 0x200005}, 0x8) 03:03:04 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e019"], 0x4a}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 380.640163] net_ratelimit: 24 callbacks suppressed [ 380.640170] protocol 88fb is buggy, dev hsr_slave_0 [ 380.650259] protocol 88fb is buggy, dev hsr_slave_1 [ 381.680134] protocol 88fb is buggy, dev hsr_slave_0 [ 381.685220] protocol 88fb is buggy, dev hsr_slave_1 [ 381.840135] protocol 88fb is buggy, dev hsr_slave_0 [ 381.845249] protocol 88fb is buggy, dev hsr_slave_1 [ 381.920700] protocol 88fb is buggy, dev hsr_slave_0 [ 381.925798] protocol 88fb is buggy, dev hsr_slave_1 [ 381.930898] protocol 88fb is buggy, dev hsr_slave_0 [ 381.935942] protocol 88fb is buggy, dev hsr_slave_1 03:03:06 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000013) 03:03:06 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x6c, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000050) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) 03:03:06 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fc"], 0x52}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:06 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0xfffffffffffffffc) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0x0) 03:03:06 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x400) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) connect(r2, &(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80) pwrite64(r1, &(0x7f00000001c0)="80aed373c17de47166a53a331fc9908b11e8dab7c45c70c53220ba4b89db1a2ff430c8902b63af9f0701e376fb3a0122f023893cfe47b4b72f83c154eb9a8d4267794d10ca0648cd04fb9cf148fd9fb74f2b08ab9e854a57f338835366e5be2b809afa36e85db0e0a3c58591d3590253fe92437159ef8749ab84e401ae9ed154312a031c43b54dad2e2af7d1fd74f9c20dd8b5ebdb4a892b18998d24b870df78113f491d14e727d322454dc7b179fa0c2021ee19ea6ad418f00970df592bf229066a4c9b301c5b28", 0xc8, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) connect$l2tp(r3, &(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:03:06 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket(0x19, 0x7, 0x7fff) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000000)) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) syz_init_net_socket$llc(0x1a, 0x3, 0x0) 03:03:06 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x6c, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000050) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) 03:03:06 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:03:06 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0"], 0x53}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:06 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000380)=0x5) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x8906, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x400100) r3 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getresgid(&(0x7f0000000680)=0x0, &(0x7f00000006c0), &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000940)={{}, {0x1, 0x1}, [{0x2, 0x7, r3}, {0x2, 0x1, r4}], {0x4, 0x2}, [{0x8, 0x7, r5}, {0x8, 0x5, r6}, {0x8, 0x4, r7}, {0x8, 0x59ffa62a6de54d27, r8}, {0x8, 0x4, r9}, {0x8, 0x2, r10}], {0x10, 0x6}, {0x20, 0x1}}, 0x64, 0x1) syz_mount_image$minix(&(0x7f00000009c0)='minix\x00', &(0x7f0000000a00)='./file0\x00', 0xdd, 0x2, &(0x7f0000000c00)=[{&(0x7f0000000a40)="d6cddab06666fb6159594d334aa7d25ee7da0fbca780f074e3a8e9a59e0a33053a6b7f847cf76baf4eb4d7ab501ff4bafd97a70a839847c5e8f40034da27cab8d57b85efe75a4812b126b668244da328ce59d2709046605acef02404b505012ba658edbee898641cefa5b79570e013c8cba436a7348d857534b9ec87060e2cc7e76d91b4fe0a91ea03f7a854f44f4a9313db1e155aa5089e95ff55662de7a1e67b2cc0246200f42ae1fcc756f439938f31da66f461cfd2", 0xb7, 0x32}, {&(0x7f0000000b00)="b28b485d3063fee7bc53ba45b5272ce8aab4a7e436eaba92a44b396787f12442226c5f2b464d45341380027b1d97651014894baa0ad043adab51512dba82a2c7266e1e6d09ee5d7ecd6fc2461c3318a190fdbc97000d68d792c62e51dc5caa55c9fca8906f899d6d6a1465e6fdb260a95467c0a91bf6872be1949033431a61ee8a17c1a330b0f7577c75b539422a595d6066185b5e38cbc7a82013ee755014c3ec0125383010f941b3482a8099b23e88332e99e207a7c38eb79caf22d2fb59e91be98d41ad92fd2d659e8dcc84bae90b5c8e584c45c190aff6cd96aba029e520121c86a64a34dafe8cb157aa86b5c8744166bb56", 0xf4, 0x3}], 0x1000000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000040)={0x8, {{0xa, 0x4e20, 0x200, @mcast2, 0x10000}}}, 0x88) fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="cef5fa20d826efbc50a601db306cd504a91202826a15cd80b3e21c7d", 0x1c, 0xffffffffffff0000}, {&(0x7f00000001c0)="542a977990c03245db5c98c942facf1a29fb252c5e0fb68cc0390e503193a7909dd56f50717e956eed370d2bc6", 0x2d, 0x4}], 0x88000, &(0x7f00000002c0)={[{@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}], [{@subj_type={'subj_type', 0x3d, '/dev/usbmon#\x00'}}, {@dont_appraise='dont_appraise'}, {@subj_type={'subj_type', 0x3d, '/dev/usbmon#\x00'}}, {@fowner_lt={'fowner<', r11}}]}) 03:03:07 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) open_by_handle_at(r0, &(0x7f0000000040)={0xa9, 0xffffffffffffffe0, "96b8d2b03af43d271af3ec3692e7172ca4f8c8fe8acd21d3204b9d1b5d4cea004a7622aa8c1581347d9879f152e5ebad5b91bef5bf2b1f79313b91c8681f3a5dc133bf114ec17a6e2349b0d18276db616c52658851188c1469f64ff7e5445bb12dca29f526fd72d197ea947a54bf753bf5051512839f3426578119b5c1d996b00727877d6a73dc1a84296a786db0967ac6cb3309d196087094c990dd9cc3c4120e"}, 0x2000) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r0, r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x8}) 03:03:09 executing program 0: getpid() r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x1000000000013) 03:03:09 executing program 1: r0 = socket$inet6(0xa, 0x7900053578b54baf, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:03:09 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) recvfrom(r0, &(0x7f0000000040)=""/8, 0x8, 0x1, &(0x7f0000000080)=@ax25={{0x3, @null, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x80) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:03:09 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:09 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0"], 0x53}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)="f6b90779df2fc0ae824172261303c4c38b48133140f23b0db1770d34c217c5bd34221b792067c104ad963cac72d20e2b61c9c3395b77cb3ebb173423eabe7977e95303c66082b498a2ca55ecab4deb5d93d8121b3c9246911127e47074b51ab43b3d2bafd2c78a959b40", 0x6a, r0}, 0x68) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x1ff}}, 0x18) 03:03:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfe, 0x80000) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r3, r3) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) setreuid(0x0, 0x0) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 03:03:09 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000040)) [ 385.840111] net_ratelimit: 16 callbacks suppressed [ 385.840117] protocol 88fb is buggy, dev hsr_slave_0 [ 385.850166] protocol 88fb is buggy, dev hsr_slave_1 03:03:09 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="00fbaf0405b0f6ad11c6d923971009f56b873adf35d95bc56b4d35542178c5ccd8212406ea2dedaa25c6e5438534d981d6355d866132f84d13eb89fb3b566e350f3c8396f005d28a3ac0d7d688b0eec2893a4248d522d24f2616fbcc00000100000000005cd72c52a2a3b32e2a440115bb99cd7abf54052148b607e39ba02745f7f6cee970253d4ebb0357eba911329722e8bb0821b0837a15fe76331100000000000000000000000032cc4ab27c70186d37152736c2ac8f01"], 0xaf, 0x1) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000000c0)={0xffffffffffffdd64, "4610cbad0549f3afd15fba75dc9750ea5e97e0eb128ea45c0719a12783f369bf", 0x102, 0x5, 0x80000001, 0x8, 0x5}) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000140)=""/33) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x6, 0x3d, 0x2, 0x0, 0x0, 0x0, 0x4010, 0x2, 0x6, 0x6, 0x357000000000000, 0x7f, 0x3, 0x3ff, 0x7ff, 0x5, 0x4, 0x5, 0x1f, 0x200, 0x7f, 0x7, 0x9, 0x8000, 0x0, 0x29bbad07, 0x10000, 0x7fffffff, 0x3, 0x4, 0x7, 0x800, 0x2, 0x100, 0x9, 0x20, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x4}, 0x80, 0x7, 0x4, 0x800000000003, 0x5, 0xa6, 0x80000000}, 0x0, 0x0, r1, 0x2) [ 386.000108] protocol 88fb is buggy, dev hsr_slave_0 [ 386.005330] protocol 88fb is buggy, dev hsr_slave_1 03:03:10 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 386.080133] protocol 88fb is buggy, dev hsr_slave_0 [ 386.085238] protocol 88fb is buggy, dev hsr_slave_1 [ 386.090346] protocol 88fb is buggy, dev hsr_slave_0 [ 386.095389] protocol 88fb is buggy, dev hsr_slave_1 03:03:10 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0"], 0x53}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:10 executing program 2: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x100) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) 03:03:10 executing program 0: getpid() r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x1000000000013) 03:03:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x10000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000080)={0x3}) clock_gettime(0x1, &(0x7f0000000000)) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:03:10 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:10 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = dup2(r0, r0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x7, 0x20}, @timestamp, @timestamp, @timestamp, @window={0x3, 0x6, 0x5}], 0x5) r2 = syz_open_pts(r0, 0x0) fchmod(r0, 0x2) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x28000) write$P9_RLOPEN(r3, &(0x7f0000000080)={0x18, 0xd, 0x2, {{0x4, 0x0, 0x2}, 0x1}}, 0x18) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x1) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000a00)={0x7fffffff, 0x2002003, "3354a2d9b427e682be0e5db9c49759b22e74e747be00", {0xfff, 0xfbf2}, 0x7ffffffd}) read(r2, 0x0, 0xf80600b6) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000a40)='/dev/dmmidi#\x00', 0x22b8000000, 0x100) write$binfmt_aout(r4, &(0x7f0000000180)={{0x0, 0x81, 0x1, 0x2c6, 0x39, 0x4, 0x3cc, 0x9}, "4ad05c89d5df0a69ce1701b527ed59cc35767052ec6034d4ab10cbb4b300aeeb5d6080134d03a57af6105911de91fbe69b7c6c52513c9893f3698b8145800777f3b0b144e78e04203538a37f1527464ed4ed4a5ed9c44265", [[], [], [], [], [], [], [], []]}, 0x878) dup(r3) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000000)) [ 386.640106] protocol 88fb is buggy, dev hsr_slave_0 [ 386.645267] protocol 88fb is buggy, dev hsr_slave_1 03:03:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) 03:03:10 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8d0}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xca6b, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="28010000170001000000000000000000e0000001000000000000000000000000000000000000000000000000000000000000ffffac1414007f000001000000000000000000000000fe8000000000000000000000000000aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000fcffffff0000000000000000000000000000000040000000000000000000000000000000000000fbffffffffffffff0000000000000000000000004000"/128], 0x128}}, 0x0) fchdir(r1) 03:03:10 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x200) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000000c0)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000100)=0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x86c2, 0x5, 0xffffffffffffffff, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00S\xf8Q<\x00\x00\x00\x17R8\x9b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xf1}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000040)={{0x9, 0x7ff, 0x7, 0x6, 0x6, 0x8}, 0x7}) [ 386.798780] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=20494 comm=syz-executor.1 03:03:10 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x100, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c776691374c8af2cfb0c4b456021dfa137b6452abbdfd28b3ee0034d94af6fad2a5", @ANYRESHEX=r1]) [ 386.862481] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=20494 comm=syz-executor.1 03:03:10 executing program 2: unlink(&(0x7f0000000480)='./file0\x00') r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x1b4, r2, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7d6200be, @dev={0xfe, 0x80, [], 0xe}, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}}, {0x14, 0x2, @in={0x2, 0x4e21, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd8c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x640}]}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) r3 = socket$inet(0x2, 0x8000000b, 0x1ff) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000001c80)={@loopback, @rand_addr, 0x0}, &(0x7f0000001cc0)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001d00)={'bridge_slave_0\x00', r4}) r5 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = fcntl$dupfd(r6, 0x0, r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, &(0x7f0000000000), 0x4) ioctl$EVIOCRMFF(r5, 0x40044581, &(0x7f0000000000)=0x100) sendmmsg$sock(r0, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGID(r5, 0x80084502, &(0x7f00000000c0)=""/101) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:03:10 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:10 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 386.966237] 9pnet: Insufficient options for proto=fd [ 386.999498] 9pnet: Insufficient options for proto=fd 03:03:11 executing program 0: getpid() r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x1000000000013) 03:03:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x100) 03:03:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) poll(&(0x7f0000000100)=[{r1, 0x5000}, {r1, 0xa8}], 0x2, 0x4) 03:03:11 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x60100) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:03:11 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:11 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000300)) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000040)=0x8, 0x8) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 03:03:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000080)=0x75, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)={r0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) fchdir(r1) lchown(&(0x7f0000000040)='./file0\x00', r3, r4) 03:03:11 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x100000000002, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) fstat(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file1\x00', 0x3, 0x7, &(0x7f0000000740)=[{&(0x7f0000000300)="24c0d14cd35bd79e15934dacd326a03ddc7873557c63e99bab0b0c083fb69e1cbd27e6ec41f219314fbeee10149d66122d4bb22854eaac4b86e95a1df534833b7f37add981abcf441a3fecdff675959262d5f56eef5fcdf72a1cb5d0d6d1dca8682eee79ef87", 0x66, 0xfffffffffffff800}, {&(0x7f0000000380)="ef37c460ec0dcccaf60f1fdc101c191fcbc8d0ad070ad26c71777a888ee3f50e63aa4692ef0d36cb941e103e397e26f0c548e30a321b16233fe3df4bb157545b9554e6fe7892ef945eb59ba4a22eaebc21", 0x51, 0x2}, {&(0x7f0000000400)="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", 0xff, 0x7}, {&(0x7f0000000500)="d3d1b34776ad5e7ef21b79a287a54ac8e866a28fbb00a178449bb248a36ac7c032fe444f5533e84cd891ccb2db1ed22750b9aa9b2669a1e844c66fc9f2623d55fd4ce5e6a46d20db237d174c10a6f2c1a67e6d10df48498166fef2643ce7a9c0e256ad28683e84c5b9e904719132ffedc8a2c12b6e9cb32561cd5da8928347b8231f8a4e3fdb6b3fa4bdc73104e120e21f4c55e6c163f0d28593cb851587d2", 0x9f, 0x4}, {&(0x7f00000005c0)="9c2e384193fd77ae1fe8d71c1b7b00ff8981d28d91677a69b57fb65ddaf4b229fc0a5f47a42648", 0x27, 0xffffffff}, {&(0x7f0000000600)="8abec4ba975c2308d65b6563df689093379632c2444f15b99671e4054ff2ba9a403f1a5a4aae63898c67fe024387febce31aec5ffd54c412a966bf9e9984f57eb831eb6493f32b15883fd64c10e921ab0ed743d8bac287dde8edb0f8472759874eff701775ab", 0x66, 0x100000000}, {&(0x7f0000000680)="9ffc907da27c0a6e9490eb121f4797f2ab9595da0d2a42b62458bcaae3ee95780c5cf6c5ea4be6a57ac724619644bb8c8a0d7fda234e5f44c400b5bfb93217e7287880b855b441f752b2571d23037165547320f3da2894c6309e9243ab8f73bc47dc0f9e7a6b4002ed96102616056145bc99547669354e051dea9354acfbc83ed7dd6a638faa07ce7f3005fca2fd7db91e0c2fb6ed9545d7e8", 0x99, 0x5}], 0x20000, &(0x7f0000000940)={[{@hide='hide'}], [{@uid_lt={'uid<', r2}}, {@dont_appraise='dont_appraise'}, {@measure='measure'}, {@obj_role={'obj_role', 0x3d, '#,(\\-'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/'}}, {@euid_eq={'euid', 0x3d, r3}}]}) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:03:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x404002, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x7}}, 0x18) 03:03:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10480, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0x100, 0x0, 0x7, [{0x5, 0x7f, 0x2f, 0x4, '!md5sum!+proceth0system@eth1-keyringnodevvmnet0'}, {0x3, 0x3, 0x1c, 0x7fff, '*\xaceth0posix_acl_access[-.em1'}, {0x6, 0x40, 0x11, 0x3, '/dev/vga_arbiter\x00'}, {0x5, 0x4, 0x9, 0x6380d591, 'nodevppp0'}, {0x4, 0x20, 0x0, 0x4}]}, 0x100) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040)=0xfffffffffffeffff, 0x4) [ 387.815847] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:03:11 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 387.984591] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:03:12 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x0) 03:03:12 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000006c0)={{0x2, 0x4e24, @rand_addr=0x7}, {0x1, @broadcast}, 0x8, {0x2, 0x4e24, @local}, 'bcsf0\x00'}) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x100000000, 0x4000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @initdev}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000440)=0xffffff46) setuid(r3) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0xa2000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r4, 0x80046402, &(0x7f0000000180)=0xc79) syz_open_dev$media(&(0x7f0000000400)='/dev/media#\x00', 0x8, 0xa01) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x5, &(0x7f0000000480)=[{&(0x7f0000000080)="211e570fe8e63e6654039e6d75916d13c07a6c1dc2", 0x15, 0x72}, {&(0x7f00000000c0)="3f8c8fbf301ca0a18527a9bfa6dd14178e4b70411814e2626786aed0268c1999513e2f298ac260", 0x27, 0x8000}, {&(0x7f0000000100)="37b6c754d4e49678d50aa098f500e03f8f364efa96ab045dc302951631cae49260fc0074f73a45edd82c0447973f7b6284c5e6", 0x33, 0x91ab}, {&(0x7f0000000200)="44767def74e47f2841ef9d1cfe51f2f4f53c0400dc97be6450b9306ccd8e8b0fa54c927bdd7d2ac04c059496ac775cb3ea497d499e3182087978171773ad90b93ca0548313baec9347f7ad78360a9c7eb928e3", 0x53, 0x7}, {&(0x7f0000000280)="23a7b9e708bb7983e48f9b42e5671c85275decd87a8ae0f85c299695c7e1c0bd3ad6cd97a8d6fb37cf87b2ac067685982f26829a25fcdf817f08503319350222d092d0e6d3ef82650dc20f2ad4a54fa50abc81f8b688c8762c4fc95823397a1758f897683e24747a531cef", 0x6b, 0xc1}], 0x1, &(0x7f0000000500)={[{@fat=@time_offset={'time_offset', 0x3d, 0xffffffffffffff66}}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@time_offset={'time_offset', 0x3d, 0x4b0}}, {@fat=@dmask={'dmask', 0x3d, 0xfffffffffffffffd}}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fowner_gt={'fowner>', r3}}, {@pcr={'pcr', 0x3d, 0x20}}, {@euid_eq={'euid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0xe61f}}, {@euid_lt={'euid<', r3}}]}) bind$rds(r2, &(0x7f0000000640)={0x2, 0x4e24, @loopback}, 0x10) 03:03:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3f, 0x400) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) r2 = socket$inet(0x10, 0x6, 0x2) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007051dfffd946f6105000a0080001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c09000000001f0012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:03:12 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) exit(0x100000001) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) ioctl$TIOCCONS(r0, 0x541d) 03:03:12 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:12 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x5, 0x400, 0x0, 0xd1e, 0x12, 0x5, 0x40, 0x0, 0xffffffffffff3ad1, 0xca, 0x9, 0x1ff}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000080)={0x8, 0xfffffffffffffff9}) lseek(r0, 0x25, 0x4) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xfd, 0x0, 0xdaf1, "3d58255eb1ec7d1f9a27f8cab6134041", "031ed29bc18238d2da8ff7977f4b9ab13c03680eb31fa861d8484b1181f51a0c13a30d0ca2fc40097bfbe318d1333e42966631ed79ded3c65ded63061b0e66e5eca3c21321b7ccad2a4c4eec27b1ff47f9811968442d33561d8dfd8a5da6f48c2112f32120239213bae2398a76cb829b4a01aec57c064f904022f402564a5c3cfc8216ec4547dbc67040c28e33369356a4f1c7794c3abbcc395aebf36acd3f213d7546fd8653d4b8f33e6d367cf9eef87d198e5fc3338d3a3420bad0eb9afc53741b09a4c74edd5d93759d28ff45347a17fc8e2d59778321f0d00f0eaa8fcbf8ad485c778bda208b"}, 0xfd, 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000440)={&(0x7f0000000240), 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x104, r2, 0x200, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xa2a}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x7fff}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}]}, 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x4044) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$rds(r0, &(0x7f0000000880)={&(0x7f00000004c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/44, 0x2c}, {&(0x7f0000000540)=""/79, 0x4f}, {&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)=""/91, 0x5b}], 0x4, &(0x7f0000000840)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000700)=""/234, 0xea}, &(0x7f0000000800), 0x41}}], 0x30, 0x7b88a9dfd3d3f96d}, 0x8001) inotify_add_watch(r0, &(0x7f00000008c0)='./file0\x00', 0x202) umount2(&(0x7f0000000900)='./file0\x00', 0x8) mknodat(r1, &(0x7f0000000940)='./file0\x00', 0x80, 0x10000) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000980)=""/238) delete_module(&(0x7f0000000a80)='wlan1\x00', 0x200) r3 = socket$inet(0x2, 0x7, 0x80) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000ac0)='nodevbdev{}eth0\x00', 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000c00)=0xe8) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000c40)=r1) clock_gettime(0x0, &(0x7f0000000c80)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000cc0)={0x6, 0xf, 0x4, 0x2004000, {r4, r5/1000+30000}, {0x4, 0x0, 0x1, 0x4, 0x80000000, 0xba, "fee7b0bd"}, 0x6, 0x7, @fd=r0, 0x4}) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000d40)={0x1, 0x68, "a8154739d10b6c639a33ca94e5dccf94ea13a53040a71e0c63cc202e007f3fc631da401c14004a48df5d813366bcb51590df56226e4c76e409a52eb0b92c6333f97d1041ccdc83f1bffcf37d244af8cb07aaac90ace0135a339a03528c860043357ac5b0d01b02e3"}) write$P9_RUNLINKAT(r1, &(0x7f0000000dc0)={0x7, 0x4d, 0x1}, 0x7) syslog(0x1, &(0x7f0000000e00)=""/119, 0x77) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000e80)="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") ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000fc0)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @empty}, 0x4, 0x0, 0x0, 0x0, 0xc8, &(0x7f0000000f80)='gre0\x00', 0x1, 0x4, 0x7}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001080)={&(0x7f0000001040)='wlan1\x00', r0}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000010c0)=@req={0x18, 0x2, 0x1}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000001100)={0x0, 'rose0\x00', 0x4}, 0x18) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000001140)=""/8) 03:03:12 executing program 2: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) fcntl$setstatus(r0, 0x4, 0x2400) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:03:12 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = dup3(r0, r0, 0x80000) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000000)={0xe, 0x2, 0xd32, 0x7, 0xbc, "e648ae32c087b47c41b4a9808f743b46b08f098a0b5ae24590f5a5830a49c867f96eac402027b3c4ac2076fdf65d7ba50b4d37dd7835ab0d12be8d209031db8f6228db795cd5f64eb22c412b8e35922a7849011026ebf76a07de9053e31b2847632af76f7cfbe3726e3a8a9d63ad35695f55de356964a24d369cd53ea93d03eb1e78317ead6b9418ee2a76563fa7e6e44a1ea9212d84c827e83ae56c0d3dc76381b7c92b7b7b351e9d6049e18867d136455914345d06d8331e3e6ef5"}, 0xc8) 03:03:12 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x22, 0x400000) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0xffffffffffffffff) 03:03:12 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:12 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x4000) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) [ 389.033762] device bridge_slave_1 left promiscuous mode [ 389.039389] bridge0: port 2(bridge_slave_1) entered disabled state 03:03:13 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x0) 03:03:13 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:13 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x44000, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1, 0x420403) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) ptrace$pokeuser(0x6, r2, 0x1258, 0x8) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) [ 389.110780] device bridge_slave_0 left promiscuous mode [ 389.116839] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.392808] device hsr_slave_1 left promiscuous mode 03:03:13 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x303800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x40, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000700)={@initdev, @initdev, 0x0}, &(0x7f0000000740)=0xc) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@union={0x7, 0x5, 0x0, 0x5, 0x0, 0xa52, [{0x4, 0x2, 0x7}, {0x4, 0x0, 0x2}, {0x1, 0x3, 0x4}, {0xc, 0x0, 0x6}, {0xd, 0x1, 0x3552}]}, @func={0xc, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x7f]}}, &(0x7f0000000800)=""/219, 0x6f, 0xdb, 0x1}, 0x20) sendmsg$nl_route(r1, &(0x7f0000000b40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000b00)={&(0x7f00000009c0)=@bridge_setlink={0x138, 0x13, 0x0, 0x70bd29, 0x25dfdbfc, {0x7, 0x0, 0x0, r2, 0x9000, 0x82}, [@IFLA_MASTER={0x8, 0xa, r3}, @IFLA_XDP={0xfc, 0x2b, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_FD={0x74, 0x1, {0x1f, 0xb, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xb88}, [@alu={0x7, 0x0, 0x9, 0xb, 0x0, 0x106}, @call={0x85, 0x0, 0x0, 0x4a}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}, @exit, @exit, @generic={0x6, 0x4f0, 0x2, 0x9, 0x1}]}, &(0x7f0000000400)='GPL\x00', 0x5, 0x8e, &(0x7f0000000440)=""/142, 0x41100, 0x1, [], 0x0, 0xd, r4, 0x8, &(0x7f0000000540)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0xc, 0x5, 0x7}, 0x10}}, @IFLA_XDP_FD={0x74, 0x1, {0x5, 0x2, &(0x7f00000005c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7b0b, 0x0, 0x0, 0x0, 0xb93}], &(0x7f0000000600)='syzkaller\x00', 0x6, 0xab, &(0x7f0000000640)=""/171, 0x0, 0x2, [], r5, 0x7, r6, 0x8, &(0x7f0000000940)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x9, 0x1, 0x6}, 0x10}}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x2}]}, @IFLA_BROADCAST={0xc, 0x2, @dev={[], 0x12}}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x1}]}, 0x138}, 0x1, 0x0, 0x0, 0x40}, 0x4000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$getsig(0x4202, r7, 0x1, &(0x7f0000000ec0)) sendmsg$nfc_llcp(r4, &(0x7f0000000e80)={&(0x7f0000000280)={0x27, 0x1, 0x2, 0x7, 0x81, 0x1, "aa98cec92e18d52c856f4da1c8f434c4311f000cfce0af896f0ce013b775d23e116e5415489f58dea1a1f9d1a6ea08684483a5d4a53dbf1c9ca0ea3878d1bf"}, 0x60, &(0x7f0000000d00)=[{&(0x7f0000000b80)="7864e322143931be143f04fbca6b023eaf385c70ede18fd632226fdcfbea69d816e11968f440b3e31565f07845fe9a66b410d22d4a6bdadf159d6f5a638e8a2aac48a419b4440608900d4a719f46abef75579ebeb264d33ecb85a4e5ea8d07919de290c87e8ddd20fba2edff88517d88adb0475b91d4755121018e2109cf988f73bd90b0800e755b83d7ddb6b24faba8cfcfe03fa114c45eb801805cf385", 0x9e}, {&(0x7f0000000300)="ef78dfc0fbf2dab32f4412edb9b210b0a0bf4c0e53b0e8fe73c98e30e80b52f492646f", 0x23}, {&(0x7f0000000c40)="75cceabe7abc7164af0c0376469d65fac73ea0d9db8cbbda577da6c76963457ebc1a83b06ce32cdf95abaa23b1bf20734b312ad810d1fd32f3eb3ea23ef145157c5a66bfcbff577f7a8ecfb5a79c8ccf1de95ba2caa3f5b63dd498c137510cdd004941d28eb623677b9fa31a78b6ef4c7b89c6c488107db0925ec9742b05d58cc947d39a91e1735ed2b2b43a2794b17685931a484078f14a5f5c239db55ac2f3d9a8bd8488923bbe963003fb", 0xac}], 0x3, &(0x7f0000000d40)={0x108, 0x104, 0x3ff, "6583275b7385a84bbd93b5964434dbc1e756cdb66c5b1b20e30c638fa32ff330b53fb6f2dafa2a9a11d9a90172efc8285748951093d84953f34209c9d6aa8f47bf29cb85cfca4240e886c9a4e33ccd547f3072b15229547315f115397c8f93209aae429b0fa28973f7586e085113fce4af47f77ae42ef8f1dabbf080024ca676d23232ae0959268643adbd54f8821162ed158ae0a29cdee446887e95f885c7cc1c57c3ea6bceabcf2ae63c5254130297518c0e9475627b311591e02b6c58c5604c468d23e1fa72f1502f0483a5ac1e9acad69b3466f989d32ea87a271c1311d73695d74f60c6708bc4971612ab7b2ff998"}, 0x108, 0x1}, 0x40000) [ 389.458235] device hsr_slave_0 left promiscuous mode [ 389.516353] team0 (unregistering): Port device team_slave_1 removed 03:03:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x7f, 0x3, 0x5, 0x4}) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:03:13 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x40096101, &(0x7f0000000040)) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, 0x0, 0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) [ 389.574834] team0 (unregistering): Port device team_slave_0 removed [ 389.651364] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 389.674063] QAT: Stopping all acceleration devices. [ 389.737427] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 389.746365] QAT: Device 0 not found [ 389.888580] bond0 (unregistering): Released all slaves [ 391.040223] net_ratelimit: 22 callbacks suppressed [ 391.040229] protocol 88fb is buggy, dev hsr_slave_0 [ 391.050254] protocol 88fb is buggy, dev hsr_slave_1 [ 391.255546] audit: type=1400 audit(1565233395.176:89): avc: denied { map } for pid=20695 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13804 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 391.771435] IPVS: ftp: loaded support on port[0] = 21 [ 392.080177] protocol 88fb is buggy, dev hsr_slave_0 [ 392.085250] protocol 88fb is buggy, dev hsr_slave_1 [ 392.250160] protocol 88fb is buggy, dev hsr_slave_0 [ 392.255239] protocol 88fb is buggy, dev hsr_slave_1 [ 392.320130] protocol 88fb is buggy, dev hsr_slave_0 [ 392.325199] protocol 88fb is buggy, dev hsr_slave_1 [ 392.330292] protocol 88fb is buggy, dev hsr_slave_0 [ 392.335316] protocol 88fb is buggy, dev hsr_slave_1 [ 392.759276] chnl_net:caif_netlink_parms(): no params data found [ 392.791667] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.798122] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.805195] device bridge_slave_0 entered promiscuous mode [ 392.813339] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.819717] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.826755] device bridge_slave_1 entered promiscuous mode [ 392.842358] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 392.851463] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 392.867219] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 392.874595] team0: Port device team_slave_0 added [ 392.880083] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 392.887124] team0: Port device team_slave_1 added [ 392.892512] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 392.899691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 392.953476] device hsr_slave_0 entered promiscuous mode [ 392.990400] device hsr_slave_1 entered promiscuous mode [ 393.030534] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 393.037414] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 393.051944] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.058299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.064965] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.071363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.097156] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 393.103539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 393.112196] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 393.122456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.129493] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.136337] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.145907] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 393.152109] 8021q: adding VLAN 0 to HW filter on device team0 [ 393.160354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 393.168028] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.174400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.190703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.208505] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.214872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.222997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 393.232145] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 393.239046] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 393.251012] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 393.261092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 393.271933] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 393.278265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 393.286281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.294320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 393.307991] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 393.318169] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 393.760720] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:03:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) r1 = dup3(r0, r0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000240)=ANY=[], 0x0, 0x0) rmdir(0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000840)=""/202) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40800000, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) dup(r2) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, 0x0, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000400)={0x0, 0x448}, &(0x7f0000000580)=0x8) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000680)={0xffffffff, 0x8}) 03:03:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:18 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4300, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r2, 0xa6d}}, 0x10) 03:03:18 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:18 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x0) 03:03:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x81, 0x5}) [ 394.566912] audit: type=1400 audit(1565233398.486:90): avc: denied { syslog } for pid=20706 comm="syz-executor.1" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:03:18 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 03:03:18 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0xffffffffffffffff) r1 = dup3(r0, r0, 0x80000) uselib(&(0x7f0000000000)='./file0\x00') ioctl$KDSKBLED(r1, 0x4b65, 0x9) [ 394.785891] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 394.822969] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 03:03:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 03:03:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 394.854418] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 394.898451] EXT4-fs error (device loop1): ext4_iget:4703: inode #2: comm syz-executor.1: root inode unallocated [ 394.949417] EXT4-fs (loop1): get root inode failed [ 394.967906] EXT4-fs (loop1): mount failed 03:03:18 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@rand_addr, @remote, 0x0}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'lo\n cK\x00\x00\x00\x04\x00\x00\x00\xe8\x00', r1}) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000080)={{0xfc00000000000000, 0x4}, {0x81, 0x94}, 0x8, 0x2}) r4 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x3f, 0x2) write$FUSE_WRITE(r4, &(0x7f0000000000)={0x18, 0x0, 0x7, {0x9}}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x25f, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="840000001400050200000000000000e1b2a43e52", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa14000600050000000180000034fd00000800000014000200fe8000000000000000000000000000aa14000100fe8000000000000005000000000000aa140006000900000001f8ffff20000000060000000800080000040000"], 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:03:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_getoverrun(0x0) r1 = dup3(r0, r0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000240)=ANY=[], 0x0, 0x0) rmdir(0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000840)=""/202) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40800000, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) dup(r2) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, 0x0, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000400)={0x0, 0x448}, &(0x7f0000000580)=0x8) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000680)={0xffffffff, 0x8}) 03:03:19 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'system.', 'H\x00'}) read$FUSE(r0, 0x0, 0x0) 03:03:19 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 395.345417] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 395.376327] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 395.401985] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 03:03:19 executing program 0 (fault-call:5 fault-nth:0): r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) [ 395.454283] EXT4-fs error (device loop1): ext4_iget:4703: inode #2: comm syz-executor.1: root inode unallocated 03:03:19 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 395.503405] EXT4-fs (loop1): get root inode failed [ 395.537749] EXT4-fs (loop1): mount failed 03:03:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) getsockopt$bt_hci(r2, 0x0, 0x1, &(0x7f0000000300)=""/203, &(0x7f0000000280)=0xcb) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x0) write$input_event(r3, &(0x7f0000000080)={{0x0, 0x2710}}, 0x18) mremap(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000000c0)={0x1, 'team_slave_1\x00', 0x2}, 0x18) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) write$P9_RMKNOD(r2, &(0x7f0000000400)={0x14, 0x13, 0x2, {0x0, 0x2, 0x7}}, 0x14) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r1, 0x0, 0xffffff1e) 03:03:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0x4, 0x2) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[@ANYBLOB="0b00000073797a31ff0f000000000000000000000000000000000000000000000000000041f14d4cd00000000000000000000000000000000000000000000000000000000000000000dcea1523674e4fc200000000000000000000d476805045b00e1800000000000000000000000000000000000000000000000073797a300000000000000000000004000000000000000000000000000000000000000000ebff00000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000002a81d9c2ad0000000000000000000000000000040000000000000000000000000000000000e2b55b2dbf86b2cbb2c200b01d373dfe97d9000104000000000000090000004ba318b7369e3b0ba51947190acf1785974dd451f316c00bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae564fda8eaef1ee8d81da25fb9ca99941d219f47e90ecf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c7cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c515b2f7a74f98b54bbfeb1b477aed01f848076721be53fcc10a4ba20fdaeb214be240ad26221d85a1a6d8bb9362c5c1234595fb3d5c765276bf8c6574194e318b345912c53e3df023843584d1a92f1e901f1f754c3b338f98b143cacf5707ccad93db71f9891b2f6792e4a0e0925407c3ec96f41dfc5140ff09826f0cd45d05d2299bd155563b102342e15b8a2a31c0ebd91129885c83192abdead2593a540ea03fdf74eaa5ef5c2b61b18a3a9eea519d6cbb77bd05e5c0000d8f331330ceaff09acd954661c1d26aa6e8172b2a79f30b2e60fe93deb4a34ac5d82f6ef5b18cccb8d984b954b4ee1e8f51417b7528c0be0558293c59e4bec05110554a3263c083b86730a0ff07029b287a80638bb8805365950ff13f357ed6d90110a3ebcbf187cda521ee7dc1d7f683a88c935c752ace235521c40f361cb57117220ed"], 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) sendfile(r2, r3, 0x0, 0x8607) mkdir(0x0, 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) recvmmsg(r2, &(0x7f0000007880)=[{{&(0x7f0000000240)=@nfc, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/55, 0x37}, {&(0x7f0000000600)=""/206, 0xce}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000002040)=""/4096, 0x1000}], 0x4, &(0x7f0000000300)}, 0x7}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000700)=""/234, 0xea}, {&(0x7f0000000440)=""/84, 0x54}, {&(0x7f0000000500)=""/167, 0xa7}, {&(0x7f0000000800)=""/230, 0xe6}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/116, 0x74}, {&(0x7f0000000340)}, {&(0x7f0000000e00)=""/219, 0xdb}, {&(0x7f0000003040)=""/4096, 0x1000}], 0x9, &(0x7f0000000f00)=""/146, 0x92}}, {{&(0x7f0000004040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/194, 0xc2}, {&(0x7f00000051c0)=""/255, 0xff}, {&(0x7f00000052c0)=""/87, 0x57}], 0x4, &(0x7f0000000fc0)=""/1, 0x1}, 0x1}, {{&(0x7f0000005340)=@hci, 0x80, &(0x7f0000007780)=[{&(0x7f00000053c0)=""/4096, 0x1000}, {&(0x7f00000063c0)=""/143, 0x8f}, {&(0x7f0000006480)=""/98, 0x62}, {&(0x7f0000006500)=""/46, 0x2e}, {&(0x7f0000006540)=""/4096, 0x1000}, {&(0x7f0000007540)=""/218, 0xda}, {&(0x7f0000007640)=""/182, 0xb6}, {&(0x7f0000007700)=""/67, 0x43}], 0x8, &(0x7f0000007800)=""/72, 0x48}, 0x8001}], 0x4, 0x2, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000400), &(0x7f0000000180)=0x5) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(0x0) mount$bpf(0x0, 0x0, 0x0, 0x8000000001910824, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:03:19 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 395.744522] audit: type=1400 audit(1565233399.666:91): avc: denied { map } for pid=20823 comm="syz-executor.4" path="/root/syzkaller-testdir621034591/syzkaller.jSNa3H/318/file0/mem" dev="devtmpfs" ino=13674 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file permissive=1 03:03:19 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:20 executing program 2: r0 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="d7f1b6c1", 0x4, 0xfffffffffffffffb) r1 = request_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='\xdbproc\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r0, 0x0, r1) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) [ 396.240592] net_ratelimit: 22 callbacks suppressed [ 396.240632] protocol 88fb is buggy, dev hsr_slave_0 [ 396.251274] protocol 88fb is buggy, dev hsr_slave_1 03:03:20 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000040)={0x5, 0x0, 0x3}) r1 = getpid() r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 396.400604] protocol 88fb is buggy, dev hsr_slave_0 [ 396.406050] protocol 88fb is buggy, dev hsr_slave_1 [ 396.417335] encrypted_key: insufficient parameters specified 03:03:20 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0) read(r2, 0x0, 0xffffff1e) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f00000000c0)=0x4) 03:03:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 396.462191] encrypted_key: insufficient parameters specified [ 396.480103] protocol 88fb is buggy, dev hsr_slave_0 [ 396.485290] protocol 88fb is buggy, dev hsr_slave_1 [ 396.490434] protocol 88fb is buggy, dev hsr_slave_0 [ 396.495514] protocol 88fb is buggy, dev hsr_slave_1 03:03:20 executing program 2: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xb, 0x2000000000000092, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x4, 0xf, 0xf, 0x7, 0x0, 0xfffffffffffffffc}, @generic={0x6, 0xa0fb, 0x0, 0x4, 0x4}, @ldst={0x3, 0x3, 0x6, 0x0, 0xa, 0x10, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x200}, @map={0x18, 0x0, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100000000}, @exit]}, &(0x7f0000000480)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x187}, 0x48) 03:03:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x8000, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x40) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000140)=""/124) 03:03:20 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:20 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x6000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneightbl={0x14, 0x42, 0x4, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061101400000000009500000000000000b93c2d982ee1a429ae063b0330c16ef289ca3419393d97cc2610d7726e1301ebc7e539"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:03:20 executing program 1: mbind(&(0x7f0000e82000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x8001, 0x0) clock_gettime(0x0, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000002c0)=[0x6, 0x6, 0x2, 0x0, 0x0, 0x0]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) mremap(&(0x7f0000130000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000d16000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0xffffff4f, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x40}}, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000080)=0x3, 0x4) socket$inet_udp(0x2, 0x2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 03:03:20 executing program 2: socketpair(0x9, 0x80000, 0x81a, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_emit_ethernet(0x7ffff, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa080014f6db1423bb440a90782b0e000000001c694b89060000000400000000"], &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x40000000010000, 0x100) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000440)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000540)={0x4, 0xee}) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='fuseblk\x00', 0x2, &(0x7f0000000780)=ANY=[@ANYBLOB="66643d8d9c26ac553e5e59e5b7ff13f18c289d14dc0a0fbd80f1cb5b7520f4439578389a2a629cad21ec8e45fb5a08d60ee3d416f2ef3d32e99bfcfc66", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',max_read=0x0000000000000005,allow_other,default_permissions,blksize=0x0000000000001800,fscontext=unconfined_u,subj_user=/dev/vcsa#\x00,smackfsfloor=,subj_role=/dev/vcsa#\x00,dont_hash,subj_role=/dev/vcsa#\x00,smackfsdef=/security#trusted^&{&,permit_directio,defcontext=staff_u,appraise_type=imasig,\x00']) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000500)={0x5, 0x0, 0x4, 0x0, 0x5}) prctl$PR_SET_ENDIAN(0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000001c0)=0xe8) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r5 = getgid() write$FUSE_ENTRY(r1, &(0x7f0000000200)={0x90, 0x0, 0x8, {0x3, 0x3, 0x3, 0x1, 0x0, 0x6dcdae69, {0x6, 0x5, 0x7fffffff8, 0x9, 0x8000, 0x200, 0x3, 0xb9f1, 0x3f, 0x0, 0xa0, r4, r5, 0x7c, 0x2}}}, 0x90) 03:03:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000180)={0x1, 0x0, {0x41, 0x4a, 0x1, 0x6, 0xc, 0x1, 0x1, 0x3}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000100)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x100000000, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={'rose', 0x0}, 0x2, [@bcast, @default, @null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x6, 0x10000, 0xfffffffffffffffd, 0x9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xd5, "ff070d349c6172630933dcdc0b9eb70c58b564cc457c378fc9967b310e659d90be823a4657e621837fc5bb346843c7d22b447ce0f3f76bef7143e93cf70da11f3c75dd01f380f7098d37c960cf7095805850e7940065bedf56e7872c60809853227bc25bb1eb163ae254a4bd7635d28389cc18b7819a327bc7101707b16e0f8685fd0c31ac11dddcdcc370d18aab90236f6588b772caae6d126b9610988925cd9333db25958120ca24dce34080f19bb1ac6b5ff20fdb03218fc782052dcd4126d0117f88b95b271df73e18b7101e5fbf6abe7ae6e8"}, &(0x7f0000000300)=0xdd) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000340)={r3, 0x4}, 0x8) 03:03:20 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:21 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000940)={0x100000001, 0x1, 0x7ff, 'queue0\x00', 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000007c0)=0xe8) fstat(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f0000000640)=[{&(0x7f0000000380)="b547c6448043966be962f462b8577a46300d4366403257d318734074cfdbc2d525b1385afaab0025045a404eb3b13bb630f16475eb19c576635239b45228c74511929bfce33ccc68ff3c2e7a80ea367356dd68ae6a92b6cf158bb13ecf4c88f31c50dcea4a365150e0db1f952d5d7010b88fca3db55e858c77667fd161f5be7d4802ad205dd42133c912e5030ab6a3ccd321522431b78c8d05d36df11bd9ede9", 0xa0, 0x11d6}, {&(0x7f0000000440)="ed7b0429f41d96e8677512f9ed3176371b14a8f4c43e692b6b06f917ba0f6f104cd346af26186dcedf353aa71d6f0561ea76b0a4d7e90c2fb994486b307f7528e6cdd080344da7cb26adf49e1899bddf5e57a9fb80acba7b957264cbcbac853e7f3c54c71a8113dc9983d8e4defdd2955ca7bcb719582575a04b5a9e3910a375faefb634aa305ee6e7a944d1dd15c0ebc8001791eb8c11b76b4bbc66842dbcaf", 0xa0, 0x1}, {&(0x7f0000000200)="1a", 0x1, 0x7}, {&(0x7f0000000500)="21e8cd519fd500ac3e84e4053927b9e95f02b5bb22251192757a5b761d1124ee6bc0098a0834231d5dd2169f543f855cf9c02b4152865cf8952c5ea0501faa8c6b4563e0d1ebc31f", 0x48, 0x1}, {&(0x7f0000000580)="485a3e57f7191abd525dca8d9b2b11579ce463e0ba17c3a2fd88c14a3707b1b30898372082ca894ffed5e6cfe3e6bbb0e38be0af4d6e63d5ee9fc5045d2a948535cdab601ac32ba57f2e7bb7a8a0054f321bd030a11fa9f18c046e11142c0341bf00c1c3c3236a2291516a3cf7c826b409a6bd8251f9b70b02416cbcd3eb9cab5f3d901bbfe5cf09549515", 0x8b}], 0x2020, &(0x7f0000000880)={[{@cruft='cruft'}, {@uid={'uid', 0x3d, r2}}, {@overriderock='overriderockperm'}, {@dmode={'dmode', 0x3d, 0x3}}, {@iocharset={'iocharset', 0x3d, 'iso8859-6'}}, {@hide='hide'}, {@nojoliet='nojoliet'}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}], [{@uid_gt={'uid>', r3}}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000a80)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x9c, r5, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x20}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffff801}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x40}]}]}, 0x9c}}, 0x200000c0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) [ 397.281481] protocol 88fb is buggy, dev hsr_slave_0 [ 397.286706] protocol 88fb is buggy, dev hsr_slave_1 03:03:21 executing program 4: r0 = socket(0x10, 0x803, 0x0) connect$netlink(r0, &(0x7f0000000180)=@proc={0x10, 0x0, 0x0, 0x1000000}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x480000) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2, 0x8040) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x5000000000, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1f) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1c, &(0x7f0000000000), 0x20a154cc) 03:03:21 executing program 1: mbind(&(0x7f0000e82000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x8001, 0x0) clock_gettime(0x0, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000002c0)=[0x6, 0x6, 0x2, 0x0, 0x0, 0x0]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) mremap(&(0x7f0000130000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000d16000/0x1000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0xffffff4f, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x40}}, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000080)=0x3, 0x4) socket$inet_udp(0x2, 0x2, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 03:03:21 executing program 2: syz_open_dev$usbmon(0x0, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syz_open_dev$mice(0x0, 0x0, 0x101000) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000180)) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) fallocate(r0, 0x0, 0x2000000, 0x3) fallocate(r0, 0x8, 0x0, 0x8000) 03:03:21 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:21 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80001, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) getsockopt$inet6_buf(r1, 0x29, 0x35, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 03:03:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) r3 = syz_open_dev$evdev(0x0, 0x0, 0x101002) readv(r3, 0x0, 0x0) write$evdev(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000000c0)="2b7adf1bafc41984df9fbf8a93395f2c57b361eb695dea39e8c53c39f6cf995dd90a5e0773492ce3f7086c0ea1bd63db77f24912101cde574dae04c791a0d016c4de036089704bdc1f4c8bf159d8331347f4e56f676a047a1768dc5c5539560ba8f19aeaae9d754f0d662a4e04fe4ba2dd0b32e4ec4e9ecd956b3431f737cc383eec8f7905894615f6167e1426ff16e3d7ed2f9d2f7d187ea43446", 0x9b) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r4, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 03:03:21 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000005c0)='./file1/file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000040)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) rmdir(&(0x7f0000000180)='./file0\x00') mkdir(&(0x7f00000000c0)='./file1/file0\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 03:03:21 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x8df1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r2, 0x7fffffff}, &(0x7f0000000100)=0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00000004060501ff0080fffdffff2e0a0000000c000100060000007d0a00010c0002"], 0x23}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 03:03:21 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:21 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:22 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000240)) r1 = getpid() r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000180)=""/28, 0xc2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)=0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc08c5334, &(0x7f0000000300)={0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000280)) timer_settime(r3, 0x1, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x1000000000013) 03:03:22 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:22 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:22 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:22 executing program 4: openat$sequencer(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/sequencer\x00', 0x341000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x101000, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000a00)=0x3, 0x4) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000a80)='/dev/swradio#\x00', 0x0, 0x2) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x101042, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x4001) r7 = dup(0xffffffffffffffff) ioctl$VIDIOC_S_OUTPUT(r7, 0xc004562f, &(0x7f0000000000)=0x1) io_submit(r1, 0x7, &(0x7f0000000900)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000000c0)="8d5ba4aecc56c2fef42e8f5f6bc81a523985d69d71c1beebdeb5bd307a819eaa8bd8a9b90b053b5ecdb68cb3ed6f17931193ccaf8b9dcfb5d036b57df0083694d75e5cab95914055f670b5f1886a807e58554f996ea36eec89d11020cd4f2b697d61101c01898e8d9e3201e4a0ea7e8162b02dd27c70e87bea1e67c7476c7f07dee4f6a5acfada158b3d346aad8f65dac21f8b731f038e9a0e06", 0x9a, 0xffffffffffffffd2, 0x0, 0x2, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x4, r0, &(0x7f0000000200)="7a64488f51352b17c06fe70f7d04793733bd7f15cdc606186471f7c520ef10bf4de4932c7fafc8d14b494a8048446848f717085b601b287dd251e2ba9cf94fca75e189439bec34c75a913758a91abd7112934df71436e538bee8fc239b9afa53c73eb7c974ef9625769b7d12d5e22c01cc2b0f1faf485cca4bfedab45adffb8e8a2ac85878afec87ac2d2055d2", 0x8d, 0x3, 0x0, 0x2, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x8, r0, &(0x7f0000000340)="21f83c900fe1943b68ce2dfe6b347c72eb6654522d39a212fa5ac06395de1313a92ac836cac222515ed93e46614cb0728ea92354a33e3b09253108e8c43656c11520d44a529ad37d68317dcfe401b5d2a389364b743731206f34192f09a8f1cb", 0x60, 0x7f000000, 0x0, 0x1, r4}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0x3, r0, &(0x7f0000000440)="c5c5745736b2af900bedda91862a8b7f3c6d0747ac0530ec92dbdea1a004828db274cd73941e0ed66faa5bf39287c1496dbaefddcf68d38f14f92b2bbc5093c72eb215463b7047a345d0ca0443cf4e98354ff470a4b96a12e06ada29fa4b0f5dedd775fa1aa16089b309f47246bfc128c03e7a7b691e4c374d9119351cde1f0c243e85c3beb757d1d9afff691a39cab248954a3f62f2f5821b6e83c88e06b716dff0fdef7249afd7b06ccc72eb7106d65ec70b1819c114cbc7b0e2ca09c7de4291f7112bc5db3651d538f09fd323263cd6d3e02872b06915", 0xd8, 0x25f6, 0x0, 0x1, r5}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xecb, r0, &(0x7f00000005c0)="8f5e33f14b16e259e7f5e43f36020ac4da88cefbdd44fa3c6d1abfe08a1177c06703e31cf81f5643ea2f55b8b8c9343d5aa39b1250a7de", 0x37, 0x1, 0x0, 0x2, r6}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f00000006c0)="7c2a793ae8130e12e1491a174cd47da9f9ae91e67e6603679c2a0fc71b30e4882530906465ed8edb3dfcd5f1a3dccaa9933a13787a5b0969d813c4663a64b394c750c0cc5fb64cb7681c9141de68815237d66e7ed82388ec5e6fad76003a903fae9d5afa78b6fbd7468f568d9864d499cbffb184c2e607c7e59992c0661bb5826ca46e07ca2e91d1d5882d0b059ddfdffacddff6510a54c243982f9b1c1326a01022cc7598801c9af150266343263998c05d1f6412fa89220676f4dacab2225a6169fd78c1940804563311404cc579e61f4e0b981f6cd8c8face4b", 0xdb, 0x9, 0x0, 0x1, r7}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000000800)="c1b890f0918874d30ac8dfbffac8d31e630382860384292d3f57d2f3f9a0446c3e7861b7cc7051cf3ad9fb6bef528c252c0857a61a2229f16de4deaf1933859e998e2c96cb1c381314b3fee28a8b7ea74c96f7cb0e86c3fad6051ac5dc2594b81486dbd0b85d4db1a65db1990f60d0d67d07f05f516a585f15b663d4c78fc753de", 0x81, 0x1, 0x0, 0x0, 0xffffffffffffff9c}]) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00@\x00'}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f0000000980)={0x9b0000, 0x1, 0x7, [], &(0x7f0000000940)={0xb909f6, 0x80000000, [], @value=0x200}}) exit(0x801f) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xfffffffffffffd7f) 03:03:22 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:22 executing program 4: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000a80)={0x0, 0x1000, "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"}, &(0x7f0000000140)=0x1008) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0xf9, "d04edfddec690951b6fa2480e6c80a21cc132d048f9aa82ac4d368577372579a111aa7f33ed347d10b4c2fe7d69ddaf5c7fb450fdf5f319a3665d6279748da4ec35d646a05f605c845682ed3f8f381bbb40ca6d58a463096eb765d2a578c2896c458831854e5ee9a86a02de22cf348187dd59ffa88cc1f04bf5e82bef51b376a3ecfdb1a572e06fb509c11f0fc7ed0154dbc4cd35c4adf2edd4ee3cc21179b4fbb583f46c9fd77183f4ebdf4522b070485beb52bfc190e865596ff094c50e1d3db1bb4cbf974b8418ca218724d9c7319fe940345ec9dca39aa404b200736fc5dde80f3ac387d9d88c68fc9677de16e2fa1ce588d45e48c6390"}, &(0x7f00000001c0)=0x101) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000600)={r1, 0x4, 0x6, 0xffff, 0x4, 0x9, 0x2, 0x3bb, {r2, @in6={{0xa, 0x4e20, 0xfff, @mcast1, 0x6}}, 0x3, 0xa80, 0x100000000, 0x6, 0x7}}, &(0x7f00000003c0)=0xb0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x0, 0x6}, &(0x7f0000000240)=0xc) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x4) add_key$user(0x0, &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, 0x0) r7 = getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) sendmsg$netlink(r5, &(0x7f0000000a40)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0), 0x0, &(0x7f00000009c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r6}}}, @rights={{0x1c, 0x1, 0x1, [r4, r3, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7}}}], 0x60, 0x4040000}, 0x40800) 03:03:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setpriority(0x2, 0x0, 0x10000) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x100) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = fcntl$getown(r0, 0x9) setpriority(0x2, r3, 0x8001) [ 399.107910] audit: type=1400 audit(1565233403.026:92): avc: denied { sys_nice } for pid=21058 comm="syz-executor.2" capability=23 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 03:03:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000400)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=""/4096, 0x1000}, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4f, &(0x7f0000000040)='%:vboxnet1eth1]-&md5sum%^eth1.}wlan1eth1,mime_type*,.mime_typewlan0\'md5sumself\x00', 0xffffffffffffffff}, 0x30) move_pages(r1, 0x6, &(0x7f0000000100)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000140)=[0x8, 0x9], &(0x7f00000001c0)=[0x0], 0x4) 03:03:23 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x109000, 0x0) sendto$inet(r2, &(0x7f0000000200)="8810a35e4b9d539958887b82e326387f9b39134503df7dcd6dff5d2a72aea20123e37bd5299807efe1703fd931976ab8a1582bfffc0f7e6d32e0ee5aac6ec80fbce1e0", 0x43, 0x0, &(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) tkill(r0, 0x1000000000013) 03:03:23 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:23 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x80001ffffffffffe) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x2, 0x4656}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r2, 0x7fff}, 0x8) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000300)=0xac) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl(r4, 0x1000008912, 0x0) accept4$x25(r1, 0x0, &(0x7f0000000100), 0x80000) r5 = timerfd_create(0x0, 0x0) timerfd_settime(r5, 0x3, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) write$P9_RREADDIR(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xe4) 03:03:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000200), &(0x7f0000000080)=0x60, 0x80800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000002200)={&(0x7f0000001880)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="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"], 0x16c}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x3) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x6) 03:03:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setrlimit(0x8, &(0x7f0000000000)={0x0, 0x6}) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000080)={0x7, 0x5, 0x80000000, 0x3, 0x100000000, 0x3f, 0xffffffff}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) [ 399.407150] rpcbind: RPC call returned error 22 03:03:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff00, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)='XFSB', 0x4}], 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000100)={0x10, 0x0, 0x2}, 0x10) prctl$PR_GET_KEEPCAPS(0x7) recvfrom$rose(r1, &(0x7f0000000500)=""/187, 0xfffffffffffffddc, 0x0, &(0x7f0000000140)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x5, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x14) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000003c0)) accept4$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x2, 0x0) sendmsg$can_raw(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x1d, r2}, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=@canfd={{0x1, 0x791, 0x2, 0x8}, 0xd, 0x3, 0x0, 0x0, "43b68cf0d50f895716a576fecd306cffaf55168d22b149c757fb7b698ae17a996c0b339da3aac9bfd7804c11211d5535d9d3dc5aa58e1a67a011406ac86f85ce"}, 0x48}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000000) 03:03:23 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:23 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 399.660797] XFS (loop1): device supports 512 byte sectors (not 0) 03:03:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000140)=0xefa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) 03:03:23 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = getpid() setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) write(0xffffffffffffffff, &(0x7f0000000a40), 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000200) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000a00)={0x3b, @dev={0xac, 0x14, 0x14, 0x23}, 0x0, 0x4, 'lc\x00', 0xffffffffffffffff, 0x7, 0x57}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000240)={0x98, 0x7fff, 0xbd, 0x0, 0x20, 0x3f}) ptrace$getregset(0x4204, r2, 0x202, 0x0) write$binfmt_aout(r4, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r4, &(0x7f0000000700)=[{0x0}, {0x0}, {&(0x7f0000000580)=""/146, 0x92}, {&(0x7f0000000640)=""/134, 0x86}], 0x4, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffdde) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000600)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000100)={0x0, 0x7}) mkdir(&(0x7f0000000140)='./file0/file0\x00', 0x1e8) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) listxattr(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) ioctl(r7, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") 03:03:23 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 400.516035] IPVS: ftp: loaded support on port[0] = 21 [ 401.440148] net_ratelimit: 22 callbacks suppressed [ 401.440153] protocol 88fb is buggy, dev hsr_slave_0 [ 401.450278] protocol 88fb is buggy, dev hsr_slave_1 [ 402.000149] protocol 88fb is buggy, dev hsr_slave_0 [ 402.005272] protocol 88fb is buggy, dev hsr_slave_1 03:03:26 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xa1c9}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) socketpair(0x5, 0x4, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e23, @local}}, 0x0, 0x40004e, 0x0, "45d404984da53c6e0af9be3e40b1e94ac1348b03b97b1df010e5d25c4147a0f57996be049eca842fd8d95f2b20e25f96790d0739fcdcddc3177a52c4b203d5202829607bbf7816ab27d27b3c09581781"}, 0xd8) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) stat(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000980)) 03:03:26 executing program 0: getpid() r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 03:03:26 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:26 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4a2f, 0x2) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/115) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x400000c1, 0x20001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}) 03:03:26 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:26 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:26 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4a2f, 0x2) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/115) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x400000c1, 0x20001) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}) 03:03:26 executing program 1: io_setup(0x1, &(0x7f0000000140)=0x0) r1 = socket(0x2, 0x803, 0xed) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = dup(r1) sendmmsg$alg(r2, &(0x7f0000007080)=[{0x0, 0x0, 0x0}], 0x1, 0x48000) io_submit(r0, 0x200002a4, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x379}]) r3 = semget$private(0x0, 0x0, 0x2) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000080)=[0xff, 0x32c, 0x4, 0x0, 0x3f, 0x9, 0xf1, 0x0]) 03:03:26 executing program 4: r0 = gettid() ioprio_set$pid(0xffffffffffffffff, r0, 0x0) [ 402.480155] protocol 88fb is buggy, dev hsr_slave_0 [ 402.485310] protocol 88fb is buggy, dev hsr_slave_1 03:03:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 03:03:26 executing program 4: mmap(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x7, 0x40010, 0xffffffffffffffff, 0xfffffffffffffffd) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x20000, 0x0) msgget(0x3, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x480000, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000040)=""/78, &(0x7f0000000100)=0x4e) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r1, 0x0, 0x3, 0x0, &(0x7f00000000c0)) 03:03:26 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 402.640109] protocol 88fb is buggy, dev hsr_slave_0 [ 402.645260] protocol 88fb is buggy, dev hsr_slave_1 03:03:26 executing program 4: futimesat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2, 0x2}, 0x1f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) creat(&(0x7f0000000080)='./file0\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000280)="b7cbc050fa9ceb6a9d66d8fb3c5d11ff48e0cadb98c2771fd443967b4656", &(0x7f0000000240)}, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000001c0), &(0x7f00000011c0)}, 0x20) 03:03:26 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r0}) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000380)={{0x2, @name="b3eb9d79d6b76a8bc0cb603e5ce8747501a95886e65f1855ef9b3cbe9ecb02ec"}, 0x8, 0x6, 0x9}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20002, 0x0) poll(&(0x7f0000000300)=[{r1, 0x20}, {r1, 0x9000}, {r0, 0x181}, {r3, 0x9}, {r2, 0x2200}, {r0, 0x7175}, {r1, 0x2000}, {r2}, {r1, 0x8040}, {r1, 0xa751}], 0xa, 0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@delsa={0x3c, 0x11, 0xf29, 0x0, 0x0, {@in6=@remote}, [@srcaddr={0x14, 0xd, @in6=@mcast1}]}, 0x3c}}, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x614000, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000040}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, r5, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x704c}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @loopback}}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80000000}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x4) [ 402.720097] protocol 88fb is buggy, dev hsr_slave_0 [ 402.725197] protocol 88fb is buggy, dev hsr_slave_1 03:03:27 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)={{0x3}}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x8, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x40800, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000540)=@assoc_value={0x0}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000005c0)={r3, 0xa9, "3a14e6a09a91c4536d5782863b5fd2546a9e3d7422c08a81c4fb7e83a0d933ac7e092b8408e2f1b2d13b6ee6633fc692e8d1c65471a0e0d375d58898218873419773c0cfa65d72c1abb8b35a1ac23c1c6d101c4b8b44a4d0bdfd29f94600864cd2098d6a7150daec1cb1c35811cc666eec454721da7ea44216c39d640ec9ae26e573ef4a4b1a7f40172a4cf62b031138ca2a871b7280eaa5781febd96b009b1e6456245ecb0df565da"}, &(0x7f0000000680)=0xb1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:03:27 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = open(0x0, 0x0, 0x1) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000280)) r1 = creat(&(0x7f0000000780)='./bus\x00', 0xb) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000680)=[@window={0x3, 0x7, 0xfde4}, @timestamp, @sack_perm, @sack_perm, @mss={0x2, 0x5}, @window={0x3, 0x8, 0x5}], 0x6) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0xe51) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r5 = accept$alg(r4, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f00000087c0)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000003c0)="9e", 0x1}], 0x1, &(0x7f0000000240)=[@assoc={0x18}], 0x18}], 0x1, 0x0) r6 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000300)=0xfffffffffffffffe) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r6, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r7, 0x84, 0x4, &(0x7f0000000940), &(0x7f0000000980)=0x4) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000a40)={0x3f, "7770d20805d38073b531f6a3c0140648fb10ad8bc7f55ea9013e9c809ea6bcf7", 0x3, 0xdd, 0x4, 0x2000, 0x10000, 0x6}) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x4000000000, 0x5, 0x0, 0xa, 0x17, 0x0, "05d927194e8a1a41df446b0ca77572cf4bc45c7a905c9b4ee525f9a4dd21a42268aae71251273cfc42abde2338e6f98c87981d355d373d1ce0ef665477bc73d5", "58e9dd58c4997eb2b61e1fa0b2678b8700dd0bc5e41f8238653263c3df6f5055517855a6e6159404fb8f5b4ff1a984429e47eddd78cdb62860f8a76ded902997", "143c607cd1c96a2d741b7e1e713b894900df69485db440f5689f1cc04a291220", [0xbf, 0xfffffffffffffff7]}) sendto(r0, &(0x7f00000007c0)="08adb8f4e5ffbfe1a4677d2b8bf2bbb8e739774ec8ac1c092602d6233e7c4f9363d0ea8d67ca63ada346d7b42e319cf1f14cdab2bfe2049cbf9e3d6eab4363a40d770684480f4f00f062a2f5f02f544f6dc4e2bc6b6c03042f5d4d3a143a265644daa7e2043a32fef8abe663eb5467bedfb0abd285a94dc3fb8b2ff86556d7812c21a28eab7bbcfa52fb49858b613fc0f5518808e0d00b9b1e7dbbe51a90ecd7fda5b0dbf3a6b38c880eced7438239b9e38c6295bae0b9f3a5bb01c8fdab9202be6a28844c906b3cbdc05fd628b26de756606f0ad4340d79a5ed6167bf96462f", 0xe0, 0x80, &(0x7f00000008c0)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @multicast2}, 0x1, 0x0, 0x4}}, 0x80) ioctl$VIDIOC_ENUMSTD(r7, 0xc0485619, &(0x7f0000000240)={0x7f, 0x200000, "132426ad66c150bc4937202db408f252384eddb4d4df431a", {0x7, 0x3ff}, 0x3}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vga_arbiter\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000540)='./bus\x00', 0x6, 0x3) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x5, 0x9}, &(0x7f00000003c0)=0x10) [ 403.297566] audit: type=1804 audit(1565233407.216:93): pid=21254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir204144617/syzkaller.UEJoFn/16/bus" dev="sda1" ino=17220 res=1 [ 403.337090] audit: type=1804 audit(1565233407.246:94): pid=21254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir204144617/syzkaller.UEJoFn/16/bus" dev="sda1" ino=17220 res=1 [ 403.382650] audit: type=1804 audit(1565233407.306:95): pid=21254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir204144617/syzkaller.UEJoFn/16/bus" dev="sda1" ino=17220 res=1 [ 403.421005] audit: type=1804 audit(1565233407.336:96): pid=21254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir204144617/syzkaller.UEJoFn/16/bus" dev="sda1" ino=17220 res=1 03:03:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4, 0x290000) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) getsockname$ax25(r2, &(0x7f0000000380)={{0x3, @default}, [@bcast, @remote, @rose, @netrom, @remote, @null, @bcast, @default]}, &(0x7f0000001500)=0x24) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x400000000000006}, 0x1c) sysinfo(&(0x7f0000000040)=""/4) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="ae50d40704fce6c8de81f68def5f8f744c1a144792f93028df0bc9e52f28b25c19842408ee2e6334e1129e7ba9549379f64abb05523f48df028a5b18c0fed6f6390b114423f6f06302eafb8c181d7a54849cf7b9b2ed1d98e01d57e29a505e92842a4d8d8f96e8f579409e26f60ceab4411236dada031b5aa73b463bc56d400f8b2998ada8442d72f35ed15ae0024a4c68052180956333fe24f65e128bac759b95ea68f7786ce55a530af9ab94ce98", 0x9d}, {&(0x7f00000013c0)="29eb9ddb80aedb663af3737201b256a586f67fcc4145ea4741be34e58250a8340a8500c870682cafac85d8bfee14cdb38e1d6f43f77c6aa35c254764d53675c97d478e521a21454159cb83b290cccc574150cbf51f25b67b46b712ad628b0a753260ad6492d3a42b969934d6c7cfbacafa6a59e81d7320db0c2abaaf18f4546f3d1a145a87e634dc8448d9ff579776aa2c55d23a9e55c8e00474bdfbc179efc5a5052bccdc685e59e4b6c0"}, {&(0x7f0000000300)="40fa5dd4ee357a9494b9cd054af20950c0c18385103d275d7448a7535b07e2feed4709175fd19d1cea8569476d8f60febbd4f5bcc4fa9ebfa1cb51ac0e403e8509c6784f8dc1882ae5b3a4088929b4de3006c68312f7e68053b712beb1bf643a33f1addeff2ca56e5480ff1881455e5f1133b80331ce2969"}], 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="51000000000000000000000000000000fe6f6b8bf292c6045cb600000000000000000000000000000000000000000000927a7f5e076d375cc6b201852b99b594ac9c94c12742310b1590ea7ef8c24d0caf8ba7f48659dd1ba411b9a62595a28a21b132b3a6688911e12966d66eccb108f7ebbb531e27279813bcb3eb1b7f4792e9f6302e303c5b59b4bc1fc0aa6fcac4ccaa021195bae954e7d31650c96e925441efce1e5d5aa05e9ffd2dfc4e22d5e4ca71b47472087012c350a8ef80d949a84c5c56a8b0a0a6469d294544869a09cc1918b2b45da0a99d576ac98994c321017f2a3caa5968473c953f58e7bc38097e945619fbec60c1f1de08cb9c73a64d6acb87e11b864da99abcc485c154e989aae060485f411dc8d801b393f82ce08f8d61a13ff0790ef06911fa18018e27b06d542f827ef685455739f987f1494361ee463056ff0ce2d4724f3a250238823f3b8b2c69d507118a72ca4a756ccea1f75891af53185cb30889a17cd1a7bbf34930a891f42a2f100ce637288d3b0de3962e4f853dd57564698163966e44b8e7d789e3b4ec4f53e6b8a210c66a814bb5e5fc25790e94e539e680ed1baadd1f84388dbf9ad8eb917e35ad8959ac46f0a39213ffdfcc3c5aa6e5f55a9d500086f78375fe1e96f4fe7980aaba5b2407be765faed244e58f1dbbf98e5417bfeb01d4bd7fd66e60b63fee211541df3161387dfa8c03a494405961a868453a10ad9b61ed953d1f37ba1a1156812b587f3770d313e12954e6bf0fbe7f67a55be61ee3e819840ff3d27d36a608dcef63c81a5ec294719a24ccdfbe2e77f0672669fe493d5716ebb8ec2c7d340ecd465cfc6e6163d38ad17f836249b5f73ebcfa933f0eb85c037829edf63a8204344e2b3d1267b278f52c6e636dc0500047412d25658e9e719e90548df1d23e28a9cfe44443adc12f34651c9ade6d7c84267776139285f1cd32fa44634499c19587cc6d95eec2548a91a6c2d073c10e593ef24e7f541b9017d6ef301a12a2ab8affbb33eb63823ff8b10d886c7fce8a6c6c2e4dc63159d23567d91bcf76883b2b59d4557a4a0610e0616a6889599429fe6fa48cbe10df4cc1126fdc80840d62c5fdb8180649c9736bb9ed299087e5093ab2d7d3091fdeb6703c276edb80c9dcd7971a5ab886c8803f834e9987959f372633189abc31629b57d3c981e104e93cc2cd096213c9bf3b1b60e1882c9279e80095af61e24918fc1f981093d36cebf49658871c3cb007e6b910977055cd86c8e4a6733fa44c02d0c3720e2dfd8b1d2da42fcabf24ababe5d76a26829ed053c0845800cef127171f11695967541c1da807b08f4c7d251cf8bc18a86713043cf15244dae5ca49f74cf507634e7ec3bcf2b7eb321d7e8f6101c740632a3dfea8d0fa103c90a84fcc03a38f2051415357576d21587da1ace9fbe3fbd15b66845c8460a568693ab43086fdfc0b48870d9221e999478f1e3c468cd51abeb5cd23172061a4c9f473ad2ebfcd0909eeaf880a5a075948ccd283a08871cc602f2c51e078af1b7da977748056d557433a9a5c521e0d9494cfd9ab5377dd37052bba5eff754066624abb7472288055708f238d7fcf692cee2e98521c2bde49ecf753e32b6b5b3bb36d3a1f98206bc90369ee8b748ea4d3093c5a030e96425d97da0dbbb9951e0c5634be6de803fbc22212ae1b05628ecab5fc3d528aebaae2e9dcca9ed215e7c4ab228c8bde79fb3441955d4e874025a16f18f732fb6f412276c6bc3e14bd3af91858830c2dd2a05794f11c0f3cd17acaf481d45510fc3708abba2faed0db7de5976c0f279eb72ede40349fff45f10c2d13fd58fd08bb18a4bfdcbc491cec5fdbe7c6e439cc5d62c54ad9c86fcea11f1cd8b457f5ec2670da92756e7e1276c636a60ffe2b56d5ef4be730a6b58d0cd18471f7f37d8561b83fbfcc942f85518db12052dfb8f7148a4c1385b0c7c1c472f87f689385e7dde16e7e01160896b9824100f84e76098d6706b7c7781cc0020275956cf4039fd8a4ba628afe8dc39ac2bd6dc66dbc9e656a0cdf78dff6f87c63286e6afe7ea90363dc4a4fa4270405f83d2c9746554ea984ba75bc49b692686d6ee0e7d39372978992a49763e3166ce699e01464f902bfe24f507351da6cb9ed04b83c042ff1053cc6da33c270d0c12a7a98e5a8ec752265917000d64d57d78b0d3214912c1f5acfd6455438dcf09836e712de474f49fec27bf23d9f793cd3d792f96656453a949ec6f087d77040c9b15cad800423f98fb5912cd3c9c5d580971fb348bbe7273ad1c1a64db4023aedb239edabab2404825ec48847d926506eead5413f8f2644cd2e4802e0a8c8e822693cecf216c244b5e7eb5c2e8920639e12cb0ed27ceeff7b59c835e41958946f1d7f1f0de174597530e7f4fde751acd02f568c4771c0347c9d6f3899d7df6b38e2c5722ade70a62a59d46b6edc24f76d32e76cc5ea62802cf271b2c8a07421eda421dc1b066bb4dd618cfb9323d872bb40efd53a177290451d792a5e2e0b6f8ac5433877aaec32edc85fd8884fc7d25e8cdf77d53733d81f044f6d3a9fa8623f9c3630be9f70a51a8f116ca3a3c01c1639a5ff091043be8b213842af7cb33676ccefea7c728418daec33b70d971442ba93a6de82d6151f3198614b5b829aa053662f8bc36f5a9f561812f5464dfaf3461ac53746a8b4df1d271da04491f612af4ad29c25785b83a7937922ca50776a083f41f143e802e8b5907960caac9c972ad4b9da0cfed2c4efc640f8db99a66566f38e77138b66d611b5efb3882d6ca3398150a86cff69d4bec8b1f4e86199a3de31622e06afc64d8798d8d5827773de79af32dfba3bf4f0e733aa392ae4607623633a8ed01ea6445897c417fa20e6723478aeb642f6b6d8fb51fcf20a552687d2b234ad36f553f096ca13ae7cb053cdcb9cb877bd2b86dc5cda790bb6f03111d0ae7c1d035111072ead33a9cf86ba2c02af19ba64031302a0db72ab9489e86c237a852ceeab648a55a0c6667a7d68d56c352c8b876e4b3785c2086222a8da712b6098431df08eb56f2c5e672e223e92292e2da37e95f2b3a1991a5b3fbecec9ea414339f26bb3f0226d8301fa3b90401c65edc2f667e2929e46bc4d2a8f821d2f49880196f4250d95b06d8eacddd394179fe13a22378fe934d53d378daf7dda8e0fc38f379244360206cb929db149bc0d1b1d5544c8f47b3573f5075fa2da12f145bd045ca93b6f4aaf688f528379cf94a382477045781b743f8cc2fe4cccb6a18b05f527022a32756a8996cae9c15f6a97245e8ca69b7d496a36828ba1a8c1ffb2087d6120abb3cfcd8c42ab2b121fb5f28a98236e06ef69bba9c7cca7f9766df28453d2d693581f1a06d0daa0f8723266b3fcd6dbde5252b5794eb54250c6614cad02c3ba466b3cd4304301cb0b190e629056e28d95a9448198010aee3f54cbcf2d37b4c1547ed4dadbc9d7f3f44496da2cbfac77848edc552591980e7d4bd4c2436f990c86132a009118cfc430d5835ed54c71f0937c25a7a5b3dca7d01aafdcd627e3d716ad10527582c983c22d2461abe9089316ebca7c2995e2141b52fb4e0d613e47b0a90caed4c0b3fb3a04e6ab1fc9022e6d2b358ba84328f9e8dfc3231b95d2d61c8ad064f314ef6bef0638f13371f590d6e9fb275f72f7638ca090cdc62b0e52f42316223fb8f9fe7f22703192c3b9561092e67a06b7270ca13683f0805bb7cab35e862ed3a3e7b21a2eee1ba8c74a88af8ea91c0d10250127ca246614e9f12acb741c6564f6ff080f1c6319c36a2d4a97a345b6e0e73333dcdbc78b7f93a8f495c456782a6888c51b4203e489923ac7c4f55947857052c06017bf1c061b6b1001da2fa2bb9f0e01e4e980014ecbdee4430cd53362b3c1a9365b361ba1f23cffa603a8840ed4d61a39fa48dc8055bdd68ab8462baeb540974dac6e689a9e55bb8338594e7d23d0725538b7e91104c820da4fefc8fbfe4f3619694e6fadb5be283b02dba2195421fc8eff7fa45e3dcd62c0505f0d9b80c46c467d16fb816b0339c7d9efc6b9fc24411f99bbae220bf302ce29960b299e5bd31071672e36ee6cf4c55b424f09593aa0dc36d90637f0a02fe5279e12f0d2f0b469bcb9f410d0c975bb25f933b2d7f9e760926249c5a08f8da815df52e7ef97a7c90fce6c97258bd8fe6671d2f88c12455292cd5223a302aee3ff7fff3ff60f823b883588385c68ce1fe3105f1760104a32927e7218ddf64962538fa8f171e25fc846352d031286244f7fe00576637eccc344bdc7728480d1a9ea84418519c2156e04c97613341611545f9222f486a934dbe4869b274615d94a608d7fdf16324dbd29fafb58aa104f33054f81e0cbc3800c9cc823bb1ea651a461aa8156f5fbf2163ddc56cc4115e30fd1a3d5906504869a6bdec1e489ff1a259155195c9b103f931be8c90f6052a4acdad86accdd9a95d8f71c86f8381dd920fae6ea92325323809f59f49b09c7bdb9b58b9127e03ddfbba2aeed650660a05eb74c58a6aa3b8687f15f2874d3f384b1bf371f0ae1ee17ca3a41612f507b9c6be5e178891f98b37cd6824eadda6db50d6a2d53a327a92ab02aa4dd4f82e4185dc9001d703d61381557f8925c0a08c2be7fb9f39ef17af17b2b60f998305d1dc89536c0ecaa965ba78bcf3d5b1a791696ff62afa90edfde5771e953084dfbda07ada617924646094c9b008db7935716b37902491fed1717373e2a49c6368f545c0938b134a175fadb43b86916f81e4c554de5b9552d0f35ec5f195dab8917a09b56fc518bd0fc513308d3795f394583527fdfd33d2d0e66774a04facdd8812cf39ba3d4691c13b4fe2767c93cb66059dcfc9dff3fb42ee1220044b832686b880d19c32712ec4d835dd19d2f59693f287a4e7d0655caeb5b20439f823368d6c2ae48cb60be65b4fe89316877509c4540f7ae34ead1c4c075ea55dcb93e4e0a53ddac7d1d2593db13e66a1eb5ae18f8a03d56fdb3f56a24c2ca78a1be33ec98b1d79dd1a1e3369944014a97f71e23095b8439682e4cfff0e9ee75ddf3e15ec95d1516ffa2a6b9901b678cfa21af711c1bbe170dbe77a291789ccb0e196aaddcb9694321f4bb014cdf5d6d6c2e5b4c5bdfd33c0fae15b36e393e990a2aee97cac737d98e6bd318437e39b6d52d91c29b6cff2d78f0d73405d835b9a4fabf74138fe3e0febee96f7bcc8f72465da5dd28b431421c849f2d9c2050c74b23e8e30805bb867ef4f53ba6451eff5611f9484c7a59b1ef548c1672e7ee3c9382b8588365b9d067daa2660a7f76090cafe3860c829d86b3973e58fa8df6a5b861af6d76653bdd98c71c25e74115444a78c3060bc409683ea5fe627397b5945784bb0fb957578aafa35d30f0abb32aa0169126704a700fbddb82d14d637e42abc64799bf754065b1f14ee5b36cbf71c38bce4f14d7c84269a2c94fe340450b6a49a4948979e5be347dfbd9daa7d0945e6a2473709b392337c0e535f3c80abd66045eb96924740afdfc59ac0f16c40ed6654568ad60c699883779b2f79bef2209dd7b8d9da31aa6450b371d3e527336475b8d168ac709e56a1eac0186b20bbabb0c94343184be6af45126152777630930611b062f5d52a140d321057092a4385c029b11e8e7d055037b258868a6f0c1b5f3bcfedbd5e499a3a507b0cc81ca7b03da8864b3ff1e405a1cb3510cf9b45d6ff51710c75261d9dcd87b4b060a4159fc7de12e8e19ddcd9050914be6d16953c3b1edfa3733a5d590046d498b11ef53acd47e68e81e923b707b4137d0d695e7b9fb638ddab623744f83b60f5a9dc29c2b02d9d8a2f18345608e36a563caab64c019257df715eca8953ba337376274e7d1f1ed097fe4a5f7466d87aee113bf3ba7ae60993283b10560da791e7510f9b7acb915dbce76f54d5582a8c3caf7948035db6c748664f252eb2e8c17a67b88dd584fb804a8c3e1495119413b935e"]}}], 0xffffffffffffffff, 0x8090) 03:03:27 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:27 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:27 executing program 1: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x80800) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) 03:03:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b80)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xc6uo\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='\x00\x00\x00\x00\x00') ioctl$LOOP_SET_STATUS64(r2, 0x4c04, 0x0) lseek(r2, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, 0x0, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000d80)={'bond_slave_1\x00', 0x3}) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d78a366696c6531"]) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') request_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000700)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80', 0xfffffffffffffffa) 03:03:27 executing program 1: inotify_init() r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/pr\x02\x00pv\x14/vs/snat_reroute\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x5}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r1, 0x80, 0x1000}, 0xc) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001340)={0x0, r0, 0x0, 0x19, &(0x7f0000000140)='/pr\x02\x00pv\x14/vs/snat_reroute\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001700)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000001800)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000001840)={@multicast1, @dev, 0x0}, &(0x7f0000001880)=0xc) sendmsg$inet6(r0, &(0x7f0000001e00)={&(0x7f0000000300)={0xa, 0x4e21, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x200}, 0x1c, &(0x7f00000016c0)=[{&(0x7f0000001580)="7189a815ffa068c9afd73d5a1cf5e02f8bd96b455eebd45b619f332cf91b617f61936e1dd7a9d64440871936cb48b8e4a92e928a28b6a96f631b12635434a362b70a39950c1bf6cd6fbe4bdc0f3445b4cc8169ba2c1c562b3f4ebc3805ee0da6c0", 0x61}, {&(0x7f0000001600)="44959e6a3eaa4122bebe95d0ccbfcb1aa6e5196fccdf0a6631349e15bfffac8890c28b7ca394788f67038f93c0feb584d20fb3b2cdec13c79719390556b9bb828bf4e8e23869d2bf8d8dc6377f61621e33c79502b35054b1327fa027991e16b61176446b8f1e79775c74c7d5aa3d66100a1f7a55382ca8a95d5c5ddf2c9cb260cb498dcf830df71a0324e55c5ef0f199dd9983", 0x93}], 0x2, &(0x7f00000018c0)=[@pktinfo={{0x24, 0x29, 0x32, {@empty, r3}}}, @dstopts={{0x88, 0x29, 0x37, {0xbf, 0xd, [], [@ra={0x5, 0x2, 0x9}, @ra={0x5, 0x2, 0x6}, @jumbo={0xc2, 0x4, 0x100000}, @generic={0x7, 0x39, "4e30851a78ea18d0b0b692c795facbe5d3e1e499367385968d656c5f091dc37f44749eb7c917f8e30aee3e334d51b9c4e30f4cb27876acb9c8"}, @ra={0x5, 0x2, 0x3ff}, @pad1, @calipso={0x7, 0x18, {0xb1, 0x4, 0x2, 0x71a, [0x10001, 0xebe]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @dstopts={{0x50, 0x29, 0x37, {0x8, 0x6, [], [@jumbo={0xc2, 0x4, 0x9ba5}, @ra={0x5, 0x2, 0x5}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x20, {0x100000000, 0x6, 0x5, 0x6d00000, [0x8, 0x1f, 0x7]}}]}}}, @dstopts_2292={{0x58, 0x29, 0x4, {0x7f, 0x7, [], [@calipso={0x7, 0x28, {0x6, 0x8, 0x9, 0xfff, [0x0, 0x5, 0xffffffffffff3df0, 0x0]}}, @jumbo={0xc2, 0x4, 0x36c1}, @enc_lim={0x4, 0x1, 0x17}, @jumbo, @enc_lim={0x4, 0x1, 0x3}]}}}, @dstopts_2292={{0x280, 0x29, 0x4, {0x3b, 0x4c, [], [@hao={0xc9, 0x10, @mcast2}, @generic={0x2, 0x8b, "9efccda1ac4efaf31faea4c5c120651e956ede28ed9a2243af67e9ee56fb1de130e95c0287e8facc7747456b8daf3513ee603d3caaba2513a3afd04d0afc2802cc3e6c8e715f476c1a4445a2bbd0501f83fe0992903e822a36161af393b3b52ea973862be62dc622f0ac6d915b350ff122f2522b5f86d39eff6f903e925d6b15cfdfb238ca6af935c48589"}, @generic={0x300000000000000, 0xd5, "2b9f9c27aebb825e5a45a0b508ca6ce83770bd7b82a1b0fe28ef38e0b7d862e0b1594eed998c06744997b3e22219f30be81783d620b97a198507188effd976db3e4ac1dbfd6fc67d76adec12bebbad188b66f1736db58606eade06f15411e50d4698cad1c81aca7f2d739a5bbe1c47be94b5656bfa07f494dc28f9b6186d80da99c7521fd87b0d95b65bfeffa20c5589fb3f2eed519ba63238eed121804a40a5cf1baf1b95934d540752535f3cbcd1465197179835df29cdbc70acaf96d2a466fb559a06f3f7705befcaa408497b5a23f00efdbb78"}, @hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x40, {0x401, 0xe, 0x402, 0x1, [0x2, 0x2, 0x10000, 0x0, 0x9, 0x1, 0xa8]}}, @generic={0x8, 0x8c, "0d1ece9973bbabebd245a3d9179e365b25bd07300ac35101fe1b5ec325ec0da41b1409b156b5a9b3411166540c2725ff2fcd629f99d1039689b9c2da2ac3f3b9a862ac929cfff277469c47b2c7e7b7a4d34a7d646d30eeae090a61b1a04bb0f430a3c2163eaede60ffe20181ddf196a9519c19905ad17922753feff58bda0b0ee6fe8b66f58f9c4e0183b7f9"}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x1f}, r4}}}, @dstopts_2292={{0xa8, 0x29, 0x4, {0x67, 0x11, [], [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x9}, @generic={0x0, 0x7c, "55e83a7628a447bd1351ac226255f231895ffc703c628c36baad6ff43b3c1eb5fee2aa06bdc3096d5a90ed02b3c1184530ad228e8d4c9044cd883e025e768d0c189a4c796aee1bd10e3854e5b3674e5ea001ef16604385642148adb39d9b1f8611f03d5116504b9478b91378419447061f57e0460644f190f86592e7"}]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x0, 0xa, 0x3, 0xfffffffffffff6ce, 0x0, [@local, @empty, @ipv4={[], [], @multicast1}, @mcast1, @ipv4={[], [], @multicast2}]}}}], 0x528}, 0x24000054) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001500)={0x0}, &(0x7f0000001540)=0x117) r6 = syz_open_procfs(r5, &(0x7f00000014c0)='net/igmp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/227, 0xe3}, {&(0x7f0000000240)=""/128, 0xffffffffffffffe1}], 0x3, 0x0) getsockopt$inet6_udp_int(r6, 0x11, 0xa, &(0x7f0000001e40), &(0x7f0000001e80)=0x4) 03:03:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000780)={'eql\x00\x03\x00\x00\x00\x00\x00\x00\x00\xfc\x00', 0x3}) preadv(r2, 0x0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x9) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000001c0)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x400, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000002c0)) openat$kvm(0xffffffffffffff9c, 0x0, 0x400, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000740)=0x0) r7 = getpgrp(r6) sched_setattr(r7, &(0x7f0000000600)={0x30, 0x3, 0x1, 0x7fff, 0x1, 0x6, 0x6, 0x7b0}, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000040), &(0x7f0000000200)=0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') preadv(r5, &(0x7f0000000480)=[{&(0x7f0000000300)=""/158, 0x9e}, {&(0x7f0000000400)=""/119, 0x77}], 0x2, 0x0) unshare(0x40000000) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000140)) socket$unix(0x1, 0x4, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000680)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}, [0xfffffffffffff000, 0xffffffff, 0x200, 0x8, 0x8, 0x7f, 0x100000001, 0x10000, 0xa8, 0x80000001, 0xc9b, 0x2, 0x7, 0x2, 0xe2be]}, &(0x7f00000003c0)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000005c0)={r8, 0x0, 0x6}, 0x0) setrlimit(0x7, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r5) getsockopt$inet6_mtu(r9, 0x29, 0x17, &(0x7f0000000240), &(0x7f0000000280)=0x4) dup2(r0, r0) 03:03:28 executing program 0: r0 = getpid() r1 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000040)='/dev/usbmon0\x00', 0x2000, 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) r3 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x939aab0bf597dcf8) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000380)={0xafbc, [0x4, 0x5, 0x1, 0x200, 0x8, 0x8, 0x4, 0xff, 0x6, 0x6, 0x6, 0x6, 0x8, 0x94, 0x6, 0x3, 0x2, 0x6, 0x9, 0x3, 0x400, 0x400, 0x9, 0x50, 0x1, 0x8, 0x1ff, 0x6, 0xa1c8, 0x0, 0x6, 0x6, 0x400, 0x6f9e, 0x2, 0x2, 0x1f, 0xffffffff, 0x5, 0x2, 0xad, 0x80, 0x1, 0x0, 0x20, 0x8b, 0x9, 0xffffffffffffff7f], 0x1b6e2fb561642778}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc08c5334, &(0x7f0000000300)) r4 = semget(0x3, 0x5, 0x0) semtimedop(r4, &(0x7f0000000140)=[{0x1, 0x6, 0x800}], 0x1, &(0x7f0000000440)={0x77359400}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) ioprio_set$pid(0x1, r0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000400)={0xffdd, 0xff, 0xffffffff, 0x10000}) tkill(r0, 0x1000000000013) 03:03:28 executing program 1: clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x5, 0x84) 03:03:28 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:28 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:28 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 404.637477] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 404.649585] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 404.656582] IPVS: ftp: loaded support on port[0] = 21 [ 404.675441] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 404.706060] EXT4-fs (loop1): mounting with "discard" option, but the device does not support discard [ 404.717165] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 03:03:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbf, 0x0, 0x3}) r3 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x10000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80040, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r5, 0x800, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x80000000}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000091) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x9a3c, 0x6, 0x0, 0x5, 0x13, 0x1c, "d16cb5f75bacceb5879780d1aa38dd90de381b59f41c2ebc6531342d257165cc2dec363b30b2fa3a8a3ed69ab736a096766781139c17c13db63e2bb31a458eda", "e2a33d33db66e418df601ae6b4aa9ca368118b46c950669adff88fb57249253697cd1362a7ec02377f1535b1fd4f029eeb6b106428e1ee8d700ccf38fee0d439", "d8c3cb664a9c69708c50b58c3f646e22169d2a6bd7b2e3d2dae309a81231907b", [0x1, 0x7fff]}) 03:03:28 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:28 executing program 1: clone(0x1bfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]}, 0x47e) socket$inet(0x2, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 03:03:28 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3035303030301a3030303030303030303030343030706f7efa6219de6469643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002000), 0x215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000003000), 0x32a) lstat(&(0x7f0000000280)='./file0/file0\x00', 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000000480), 0x1000) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x13) 03:03:28 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x401, 0x10100) write$selinux_user(r2, &(0x7f0000000040)={'system_u:object_r:root_t:s0', 0x20, 'staff_u\x00'}, 0x24) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045006, &(0x7f0000000940)) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x1b0, r2, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7a0e}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2fc200000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x151}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd49}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb270}]}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe44}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x4, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x80) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x100000001, 0x3, 0x932d, 0x4, 0x40}, &(0x7f0000000480)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000004c0)={r3, 0xa07}, &(0x7f0000000500)=0x8) [ 405.169795] IPVS: ftp: loaded support on port[0] = 21 03:03:29 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = perf_event_open(&(0x7f0000000040)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xfffffffffffffffe, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 03:03:29 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:29 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x101, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r2, 0x65, 0x1, &(0x7f0000cbc000)=""/244, &(0x7f0000000180)=0xf4) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x4, 0x7, 0x4, 0x3ff}, {0x9, 0x3, 0x401, 0x5}, {0x9, 0x6, 0x4, 0xffff}, {0x1, 0x7, 0x10001, 0x8}]}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 03:03:29 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbf, 0x0, 0x3}) r3 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x10000) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80040, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r5, 0x800, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x80000000}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000091) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x9a3c, 0x6, 0x0, 0x5, 0x13, 0x1c, "d16cb5f75bacceb5879780d1aa38dd90de381b59f41c2ebc6531342d257165cc2dec363b30b2fa3a8a3ed69ab736a096766781139c17c13db63e2bb31a458eda", "e2a33d33db66e418df601ae6b4aa9ca368118b46c950669adff88fb57249253697cd1362a7ec02377f1535b1fd4f029eeb6b106428e1ee8d700ccf38fee0d439", "d8c3cb664a9c69708c50b58c3f646e22169d2a6bd7b2e3d2dae309a81231907b", [0x1, 0x7fff]}) 03:03:29 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200080, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000380)=0xc) sendmsg$nl_route(r0, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@ipv4_delroute={0x25c, 0x19, 0x112, 0x70bd27, 0x25dfdbfb, {0x2, 0x10, 0x0, 0x2, 0x0, 0x2, 0xfe, 0x7, 0x1000}, [@RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x8f, @uid=r1}}, @RTA_ENCAP={0x168, 0x16, @nested={0x164, 0x6b, [@generic="d0205b342e27dd", @typed={0xdc, 0x64, @binary="b603a61694477e79931ce7be4034a5ca5add4867b1b725a70795e22d36bce163cbccc0d6835c7a49824ebdd5d00e2f113349a681021e3247534596e41ac4c9a3c11255c40a2f4856fe09d764f128da055c333930dbbe869309e2df1581013bb964f5d14b5bfe58cdc200c56f02585a32ecc53077a7d5a9229552d8f28b19f9de0f921bb2d65cbc1b673e0d31da6cb77cb91c85f79d5220e3a62e23038d1fbb9aa5bdfd99905987695bc3185f5f7a4fa3bc7017662358154c1289674f1ebdccaeebd6d5bcade96c118eb7f5d11805bcd0a816b13eb81666"}, @generic="f5f0d1c0f648a4f3373004fb123f54fee01671e2ad7fffb1ffbf8b090a4bf7a4878171cf0d10af4ca5eaedd5bbb97b8b614e7005", @generic="6ddad2b945903d8bc77c8f34ec088f42ae4856aaa3b3eedc30b684582a00b8299e22eeeb046e8dcf1da91e2d1c857c5831dbb6e5b8c96008df2744252748f072a88f9d6672e760a495"]}}, @RTA_ENCAP={0xcc, 0x16, @generic="444a96365b7a05f848cecb25bd4fecdcb54b7ad3798a73a7edf054928f8cea532d2184a057537ebfb85a026018f3d653bdc730f883cbebef2a10f3e59ea6ff6e442b6a9bdde584cf68b3bc0ba1d908f89d7c09ac68cd206d8d354fdaa0743ec5d591939405d674eec03e0b6723ab8f92ef57f85727a34eeb4bcb01d06ccc15f2696f8fe979bc8a799ef5cc627cca18b9e438548ddee058245c62236426e64727d4822f0e9015809c4f96ecd7b7b1b04bdbd411a6c3674b504a0ee75c812214a8cdec0bce69b4"}]}, 0x25c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4084) r2 = getpid() r3 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r3, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000700)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc08c5334, &(0x7f0000000300)) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000006c0)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 03:03:30 executing program 1: symlink(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x8400, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000001a00)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'tunl0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000001c0)={{0xf4e1}, {0x0, 0xfff}, 0x80000000, 0x0, 0x1}) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) epoll_create(0x3de1) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) 03:03:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8}, 0xb) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@alg, 0x80, 0x0}, 0x0) dup2(r0, r0) shutdown(r0, 0x1) 03:03:30 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r2 = getpgid(0x0) r3 = inotify_init1(0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x3, 0x10000, 0xec, 0x3, 0x14, 0x31, 0x2, 0x5, 0x100000000, 0x7fff, 0x9, 0x1}) fcntl$setown(r3, 0x8, 0xffffffffffffffff) kcmp(r2, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 03:03:30 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x200000) r0 = syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) 03:03:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x6, 0x0, 0x0, 0x2, 0x0, 0x70bd2a}, 0x10}}, 0x0) 03:03:30 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)={0x31, 0x5}) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101002) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0x100, 0x3cf1, 0x0, 0x1, 0x2, 0x4, 0x101, 0x6, 0x1f, 0x6, 0x100}, 0xb) ptrace(0x10, r0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000040)={0x4, 0x3, 0x7fffffff}) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x100000b, 0x0) [ 406.640126] net_ratelimit: 18 callbacks suppressed [ 406.640132] protocol 88fb is buggy, dev hsr_slave_0 [ 406.650226] protocol 88fb is buggy, dev hsr_slave_1 [ 406.678206] Unknown ioctl -1070836168 03:03:30 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:30 executing program 2: r0 = open(&(0x7f0000000280)='./file1/file0\x00', 0x40, 0x2) bind$rds(r0, &(0x7f00000002c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperle0,lowerdir=./filg1,woskdir=./file1']) fsetxattr$security_capability(r1, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)={0x1d0, r2, 0x401, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8adb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8cba}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bpq0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8a3f}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffa8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffc1}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xbf9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6a}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe664}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x4040000}, 0x40000) chdir(&(0x7f0000000380)='./file0\x00') socket$tipc(0x1e, 0x2, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) [ 406.800139] protocol 88fb is buggy, dev hsr_slave_0 [ 406.805262] protocol 88fb is buggy, dev hsr_slave_1 [ 406.881955] protocol 88fb is buggy, dev hsr_slave_0 [ 406.887531] protocol 88fb is buggy, dev hsr_slave_1 [ 406.893730] protocol 88fb is buggy, dev hsr_slave_0 [ 406.899113] protocol 88fb is buggy, dev hsr_slave_1 03:03:30 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000380)={0x5, 0x6, 0x40, 'queue1\x00', 0x1}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:31 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x200000) r0 = syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) 03:03:31 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 407.373575] overlayfs: unrecognized mount option "upperle0" or missing value [ 407.485606] Unknown ioctl -1070836168 03:03:31 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200080, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000380)=0xc) sendmsg$nl_route(r0, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=@ipv4_delroute={0x25c, 0x19, 0x112, 0x70bd27, 0x25dfdbfb, {0x2, 0x10, 0x0, 0x2, 0x0, 0x2, 0xfe, 0x7, 0x1000}, [@RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x8f, @uid=r1}}, @RTA_ENCAP={0x168, 0x16, @nested={0x164, 0x6b, [@generic="d0205b342e27dd", @typed={0xdc, 0x64, @binary="b603a61694477e79931ce7be4034a5ca5add4867b1b725a70795e22d36bce163cbccc0d6835c7a49824ebdd5d00e2f113349a681021e3247534596e41ac4c9a3c11255c40a2f4856fe09d764f128da055c333930dbbe869309e2df1581013bb964f5d14b5bfe58cdc200c56f02585a32ecc53077a7d5a9229552d8f28b19f9de0f921bb2d65cbc1b673e0d31da6cb77cb91c85f79d5220e3a62e23038d1fbb9aa5bdfd99905987695bc3185f5f7a4fa3bc7017662358154c1289674f1ebdccaeebd6d5bcade96c118eb7f5d11805bcd0a816b13eb81666"}, @generic="f5f0d1c0f648a4f3373004fb123f54fee01671e2ad7fffb1ffbf8b090a4bf7a4878171cf0d10af4ca5eaedd5bbb97b8b614e7005", @generic="6ddad2b945903d8bc77c8f34ec088f42ae4856aaa3b3eedc30b684582a00b8299e22eeeb046e8dcf1da91e2d1c857c5831dbb6e5b8c96008df2744252748f072a88f9d6672e760a495"]}}, @RTA_ENCAP={0xcc, 0x16, @generic="444a96365b7a05f848cecb25bd4fecdcb54b7ad3798a73a7edf054928f8cea532d2184a057537ebfb85a026018f3d653bdc730f883cbebef2a10f3e59ea6ff6e442b6a9bdde584cf68b3bc0ba1d908f89d7c09ac68cd206d8d354fdaa0743ec5d591939405d674eec03e0b6723ab8f92ef57f85727a34eeb4bcb01d06ccc15f2696f8fe979bc8a799ef5cc627cca18b9e438548ddee058245c62236426e64727d4822f0e9015809c4f96ecd7b7b1b04bdbd411a6c3674b504a0ee75c812214a8cdec0bce69b4"}]}, 0x25c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4084) r2 = getpid() r3 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r3, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000700)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc08c5334, &(0x7f0000000300)) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000006c0)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) [ 407.680143] protocol 88fb is buggy, dev hsr_slave_0 [ 407.685370] protocol 88fb is buggy, dev hsr_slave_1 03:03:31 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000040)={0x2, 0xffffffffffffe5ea}, 0x2) read(r1, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000380)={{0x3, 0xffffffff}, 'port0\x00', 0x10, 0x21, 0x6, 0x8, 0x2, 0x8, 0x6, 0x0, 0x1, 0xfffffffffffffffb}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x200000) r0 = syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) 03:03:31 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:31 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 408.019535] overlayfs: unrecognized mount option "upperle0" or missing value 03:03:32 executing program 2: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getrandom(0x0, 0x0, 0x3) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x1c8, 0x0) r0 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff7fffffffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x5}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB]) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)=0xc188) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) 03:03:32 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="10dca50d5e2be6e47bf070fbd14e76afd3f73ba5c774caeb5f44eba4b5ef0d340a3f2a4a47725f751b5d637152583403dfaf20f831ae211ee89be4a713fa821b21f091cbb827de0fbc0b78cdaff0734d71412bc22a73582245be40b320e37a42861e71422d8c58a6d981dc3c7cf223b940a37679d73a8682d31641a891ad93cd74cb65c4bd96e4681bd41b92b2c0c7") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='i\x876_9\xf8i0\x00 \x00', 0x10) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x3, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000040)=0xe8) ioprio_set$uid(0x3, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffedf) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) recvmmsg(r0, 0x0, 0xfe26, 0x100002040, 0x0) prctl$PR_GET_KEEPCAPS(0x7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{&(0x7f0000000ac0)=@alg, 0x80, &(0x7f0000000e40)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/71, 0x47}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000000c40)=""/30, 0x1e}, {&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/83, 0x53}, {&(0x7f0000000d00)=""/108, 0x6c}], 0x7}}], 0x1, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000942000)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r4, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r4, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x116, &(0x7f0000000d80)}}], 0x6d7, 0x40400d4) 03:03:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x200000) r0 = syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) 03:03:32 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:32 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:32 executing program 4: mount(0x0, 0x0, &(0x7f0000000080)='ramfs\x00', 0x1, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8a4e, 0x800) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={&(0x7f000040a000/0x3000)=nil, 0x9, 0x222b71ebab1bb205, 0x4, &(0x7f0000ffc000/0x4000)=nil, 0x79}) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 03:03:32 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000200)={{r2, r3+10000000}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:32 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)=0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20000b28f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0xfff}) 03:03:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1f}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="0f06263e0f300f01c426f30fc776130f01c5f30fc7b4cd08000000e300c4c3fd01bcfc7ff800002e0f7938f4", 0x2c}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x1, 0x6000, 0x2000, &(0x7f0000016000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x87, &(0x7f0000000080)='/dev/kvm\x00'}, 0x79) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:03:32 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 409.008375] kvm [21581]: vcpu0, guest rIP: 0x142 disabled perfctr wrmsr: 0xc2 data 0x1 [ 409.172276] kvm [21581]: vcpu0, guest rIP: 0x142 disabled perfctr wrmsr: 0xc2 data 0x1 03:03:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600203f00000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000e2ffffffff00170000000000000000"], 0x80}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[], 0xffffffffffffffe5}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x101000) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000240)={0x2, 0x1, 0x2, 0x401, 0x3, 0x1}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000180)=0x2) 03:03:33 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:33 executing program 4: syz_emit_ethernet(0xffffffffffffffcd, &(0x7f0000000040)={@broadcast, @remote, [{[], {0x8100, 0x7, 0xfffffffffffffffd, 0x4}}], {@mpls_mc={0x8848, {[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x5}, {0x7fffffff, 0x0, 0x2}, {0x800, 0x0, 0x7fffffff}], @generic="e2d9bfef9df047d779dbd8cde7c5c7a8"}}}}, 0x0) 03:03:33 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:33 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:33 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{}, 0xfffffffffffffffd}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x14800, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000002c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000240)={'team0\x00', r2}) recvfrom$packet(r1, &(0x7f0000000140)=""/234, 0xea, 0x42, &(0x7f0000000280)={0x11, 0x1d, r3, 0x1, 0x7, 0x6, @dev={[], 0xe}}, 0x14) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) 03:03:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v2={0x3, 0x1, 0x14, 0x4, 0x56, "2737c3d1a5a58464eccfc2c02ef606084a14c8f0908afb278e5659b996a740b38cbe7ba7563e4d03e620544f1eefbebd72e12925ada75b1881facc156edc24f959abc392a8395e18738f42d9e80dce6d99bc3adaa272"}, 0x60, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180)=0x3, 0x4) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000140)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000001600), 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 03:03:33 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$tipc(r0, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:03:33 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000580)={0x4876, 0x0, 0x2033, 0x7, 0x0, {0x9, 0xd8}}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2010}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00', @ANYRES16=r3, @ANYBLOB="000226bd7000fbdbdf25110000000800050080000000080004007f000000080004000700000008000400b10c00001c00020008000d0000000000080005009ff6000008000700040000005000010008000b0073697000080002002e00000008000b00736970001400030000000000000000000000ffffac141419080001000a000000080009006a0000000800080000000000080004004e2100001c000300080004000800000008000100010000000800040081ff00000800050001000000"], 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x40000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000000040)={0x5, 0x80000001, 0x4}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r2, &(0x7f00000005c0)="1de8a22ed4f3c843ffb7685ed4f11ed28ab15b9c8463a932a8438d913f075e7d79989b6a3ab01cf8bc05b1f414e8cdd275bf013472563db6efafcbbfee9de527fd5b97cdccb6c20fbb75cf5cd06fcec9b6b64cf64199a4ee671b68b7b8fa17d682ca512cbd1f73684800d42813380a264d323c357740cdb323f19af6f26e8590af5413f608fd049f991de2f5da403ea11c58ffe11cf5c63baa61265aff8383e68c0808eb5d10761219ab3ce7b34cea76c752fb513c3edbea46f8da3e12a7677fe74d595d28a8a149243c4e5b5b25a68309883c727017acfbdd8fcffa012a28b4fbda29335336c5e23785db2a1d587e8a219d7048e9f4b572", &(0x7f00000006c0)=""/178}, 0x18) 03:03:33 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000200)={{r2, r3+10000000}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:33 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:33 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x9, 0x4000000000) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x4}, 0x28, 0x3) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x3011}}) 03:03:33 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:34 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000040)}, 0x20) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x240000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') 03:03:34 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x5, 0x1, @rand_addr="51d2a7e81f95fd3e0075e2b5cb537505", 0x17b}, {0xa, 0x4e23, 0x9c9, @rand_addr="154a3192f8fa2d61b1e3b95486b1458c", 0x1}, 0x549, [0x7, 0x101, 0x4, 0x10001, 0x9, 0x38, 0x3e, 0x2]}, 0x5c) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000040)=0x100060, 0x8005) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, 0x0) 03:03:34 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, 0x0) ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:34 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000200)={{r2, r3+10000000}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:34 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:34 executing program 0: r0 = getpid() r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x200, 0x400002) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000040)={0x1, {0x3, 0x1, 0x56a, 0x5}, {0x7, 0x3, 0x2, 0x20}, {0x3, 0x5}}) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000280)) perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0x2, 0x2, 0x3ff, 0xfff, 0x0, 0x6, 0xa02, 0x8, 0x8, 0x0, 0x100000001, 0x101, 0xe2f, 0xfffffffffffffff9, 0xffff, 0x3f, 0xfd4, 0x8, 0x2, 0x8, 0x101, 0x3, 0x20000000000, 0xff, 0xff, 0x79, 0x7fff, 0xc547, 0x976, 0x4, 0x51541710, 0x9, 0x100000001, 0xee4, 0x1, 0xff, 0x0, 0x9, 0x0, @perf_config_ext={0x1f, 0x80000000000000}, 0x80, 0x1, 0x0, 0x7, 0x1, 0x20, 0xc437}, r0, 0x9, r1, 0x8) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:34 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, 0x0) ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:34 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:34 executing program 1: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfffffffffffffffe}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x3, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x112a) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() fchown(r0, r1, r2) r3 = shmget(0x3, 0x2000, 0x401, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000001140)=""/4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 03:03:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x46) r3 = epoll_create(0x20) r4 = epoll_create(0x800f61) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000dff4)) r5 = epoll_create(0x1) r6 = epoll_create(0x5) r7 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4600, 0x200000) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r7, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000b300}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x224, r8, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x16e}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6e6d053f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x416}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7e}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x80000001, @rand_addr="b19a4b9c3f57da6fc2f893b1c5c42746", 0x2}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4ab}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x92}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4b57}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x143d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x801}, 0x40) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f0000c7f000)) r9 = epoll_create(0x2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x2000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r5, &(0x7f000050aff4)={0x20103001}) 03:03:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, 0x0) ptrace$cont(0x29, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:35 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:35 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900019208000000002208f6f00061"], 0x2c}}, 0x0) exit_group(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x6, 0x10, 0x81, 0x2}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xe, 0x0, 0x1f, 0x101, 0xa1}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x101, @ipv4={[], [], @multicast1}, 0x4}}, 0x1, 0x4}, &(0x7f0000000200)=0x90) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40081, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0385720, &(0x7f0000000040)={0x1, {0x0, 0x989680}, 0xfffffffffffffff7, 0xff}) 03:03:35 executing program 1: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x100000000, 0x20000) signalfd(r0, &(0x7f0000000240)={0x80000001}, 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0xfffffffffffffff9, 0x4) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000140)=""/141) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000280)={0x4, 0xb357, [0x38e, 0xd3, 0x0, 0x5, 0x6], 0x6}) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r2, 0x0, 0x2, 0x4}}, 0xfffffd80) 03:03:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0xffffffffffffffff, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:35 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2001, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000080)={0x7, 0x0, 0x201f, 0xa7, 0x918f, 0x9, 0x7, 0x1}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000100)={0x0, 0x5}) 03:03:35 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x6f9, 0x77, "eab0ecaa4660eabecd4ace78a2e8634ae610ba42d439b0213c4cd50852906fcdd24fc6270a51fcacb0559b6f7bff315af8cf2cc291e429e0acd223552aeec096382458908ae08afde043479787eb8b938ee3e90f1f54e1e51acd9425c9110e754d4d1f6cdaf05723c588516b8d985a2447e848df94eef2"}) tkill(r0, 0x1000000000013) 03:03:35 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:35 executing program 1: gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x10, &(0x7f0000000080)={0x1ff, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e22, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}, 0x9}, {0xa, 0x4e20, 0x2, @rand_addr="3bc6e9ee8256e7ba685daf6f31ffc1a3", 0x6}, 0x2000000000000, [0x1f, 0x80000000, 0x8, 0x3, 0x7, 0x6, 0x4, 0x1c]}, 0x5c) tkill(r2, 0x10010000000034) fcntl$setstatus(r1, 0x4, 0x80000000002c00) getuid() 03:03:35 executing program 4: r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x40000000000000) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000100)={0x4, @vbi={0x0, 0x5, 0x80, 0x20303159, [0xb0, 0xe0], [0xfffffffffffffe00, 0x6], 0x1}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000200), &(0x7f0000000240)=0x10) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r2, 0x0, 0xc478, 0x5) fallocate(r2, 0x0, 0x0, 0x4005ef0) write$P9_ROPEN(r2, &(0x7f00000000c0)={0x18}, 0xff9c) fallocate(r0, 0x3, 0xe0ff, 0x8001) [ 411.840126] net_ratelimit: 22 callbacks suppressed [ 411.840131] protocol 88fb is buggy, dev hsr_slave_0 [ 411.850235] protocol 88fb is buggy, dev hsr_slave_1 03:03:35 executing program 4: openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) fadvise64(r0, 0x0, 0x809, 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getrandom(0x0, 0x0, 0x0) getcwd(0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x3, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000200)=0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000100)=0x1f) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0xafe7, 0x100, 0x6f1, 0x80, 0x17, 0x0, 0x400, 0x0, 0x0, 0x3bad}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000180)={0x9, 0x7fffffff}, 0x2) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 411.915703] ptrace attach of "/root/syz-executor.1"[21794] was attempted by "/root/syz-executor.1"[21797] 03:03:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0xffffffffffffffff, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:36 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, 0x0) ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:36 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0xffffffffffffffff, r2, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 412.400119] protocol 88fb is buggy, dev hsr_slave_0 [ 412.405236] protocol 88fb is buggy, dev hsr_slave_1 [ 412.507313] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 412.544347] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 03:03:36 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900019208000000002208f6f00061"], 0x2c}}, 0x0) exit_group(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x6, 0x10, 0x81, 0x2}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xe, 0x0, 0x1f, 0x101, 0xa1}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x101, @ipv4={[], [], @multicast1}, 0x4}}, 0x1, 0x4}, &(0x7f0000000200)=0x90) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40081, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0385720, &(0x7f0000000040)={0x1, {0x0, 0x989680}, 0xfffffffffffffff7, 0xff}) 03:03:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000a80)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[@ANYRESDEC=r1, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="764d6712f95c8e93945c2ce4d79e672360a5efe851ceff17749a5e150de37bf40a3ee79339d13dc75af449f168d2c3ab2c03e514d8a28d76279eb4dd22e245a2b423421df345a2ca6d578118ae255987d14ec1f77d"]], 0x5) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) getegid() getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x7f}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e22, 0x6, @empty}}, [0x1ff, 0x5, 0x7fffffff, 0x0, 0xffffffffffffe12d, 0x4, 0x100000001, 0x75, 0x9, 0x7, 0x0, 0x0, 0x8001, 0x1000, 0x400]}, &(0x7f0000000340)=0x100) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000640)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) read$FUSE(r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x8a}, 0x1c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000440)={0xfff, 0xc, 0x1, 0x1, 0x5, 0x3, 0x800, 0x3, 0x39ee, 0x9}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f00000003c0)) 03:03:36 executing program 4: r0 = eventfd2(0x1, 0x80800) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x82000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x6c, 0x2, 0x80000001, 0x8, 0x7, 0x7, 0xc08, r2}, &(0x7f0000000280)=0x20) write$binfmt_aout(r0, &(0x7f0000000400)={{0x107, 0x5, 0xbd, 0x2a6, 0x3ba, 0x5, 0x290, 0x3}, "782db2024dfcb0002dbecc6dbfdc45adbcde89e8603b704392081b0c981bc80ab7e9319a4d0f64a8c98aec4d8d76d526ac99789bca4c75511b0f49d0b59f3be9fb8f", [[], []]}, 0x262) syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 03:03:36 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, 0x0) ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:36 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:36 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xef22, 0x206000) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000040)=""/103) r1 = socket(0x8, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x3c0) [ 412.880464] protocol 88fb is buggy, dev hsr_slave_0 [ 412.886033] protocol 88fb is buggy, dev hsr_slave_1 03:03:36 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, 0x0) ptrace$cont(0x29, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:36 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x40, 0x80000) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x6, 0x4) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000080)=""/176) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000240)={0x14, 0xc4, &(0x7f0000000140)="73cecb287b271e2dbdb76ad4c9d6bfeaeb157a3e11396f2a64c7c157e5571a82c8b1a79be6ebd42cecd569beae104d942e605f3ad3837bdc3c2867176aecbd441eba80c3d250dc7ae6fd9a10621a0ac7a995552f806c5c5452786ac8eef9f7124f5c46783c426e57f9e93fd163c93ba6390fcb975bc3cc0a9cd74e6e972c89d923e6d251c9394da64d76a33fc164cb21b872d133fc9411ea7f33236a06c1eb682c9a63ab278af0843ea85aafcf710d714bec146f7ed1c2ad32819905efa6446c622e455a"}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000280)={0x5, "e508fbc588bf79ad49a3cc350d72543f364bf89b5e6009eceec0131df6a4a276", 0x3, 0x1}) sendmsg$inet(r1, &(0x7f00000007c0)={&(0x7f00000002c0)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000300)="65638d372e99a9786efc2d74c538fac885421daff3582c2d042f93448564ce45334abc3d5f865e2060d204266b6e76045528b0c4a2b6a572a4e401aad00e1acae3d93532b4bb525271ba47cde612bd6700e044b0527ec95e090f92b47ff2449fbfa5ee44bb53a9ea6d903037fa827ebc8776e5ab2d450c1be177b23822f5ebf18a3bfad49bb5b21e6dcaaeb159978d997dcc752fdc36f5853e7a4f91a00868845f3bce4511e3b2e355b45ba0e9835be6269f1fa3fcedfce988b86e2f178ed211f8234ff7b3a9939bb2b8915314c3fdf6c0be0be9e0ce0cedb5574c1c137b1828fbf0e6d676c6b0b4fd1092a173c8b04ca5603d044c4427a2bb93", 0xfa}, {&(0x7f0000000400)="c1f317b61abc9f715bcc12ae514711ef197ebcbadef3870990c074497d7512785cbc392f72173e2b851b40b961d6630bdb3296050dcbfdd480eb99e1c58a18c31b42d3ad32e71ebf8eae28026bb6c51e9eda42460bf862f06b25271b487932b8fb8dfc7839506f14193f2143612a147c309adf85aa7a1b3190bc68987dddc4665be1b98f0af2c1e856ad2385cd34f757dc75afc4db1875ba994fc28188d4755befedbd1aea28c98155a1be733872", 0xae}, {&(0x7f00000004c0)="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", 0xfd}, {&(0x7f00000005c0)="56ed9d5f9a7b474bb3aacd06ecf154259c0e86afe66479e8", 0x18}, {&(0x7f0000000600)="7656e98358b5d669279499704cef1ee234ed643d", 0x14}, {&(0x7f0000000640)="60d5050dabf647ba9c0bc8de4a992112fd6785ac2b5e9a30f14307e3bcb1313eff1ecbf24fc7027614df0f0787484603bfeb1a1fd833b766e50091f07bbdedff722e2b2938ea4552a6d0db8668becbe2388c2c7f3b4140e9e3f67302456ad8a2a6bb6549e7dacd433ff1527a41896d7aa813fe544be3354b5e7618c9ab0117c638746fccfa10e2a5ed2fd871791c57541e995c4cb7bc0f2d119a5b359b27ecf48556d514c9e38200a6273ab18babe27bdaf640bd5b8d2a92e2c4b6676575b00d69c95d8e2326b5cbbdbe4c96a3e0b3ee64815dfe385634070af6fc0fb61514cf26eeceaf94876df70bf81a", 0xeb}], 0x6}, 0x20008010) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000800)) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff8, 0x204040) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@loopback}}, &(0x7f00000009c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000a00)={@mcast2, r5}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000a40)={0x7fff, 0x3ff, 0x80d, 0x1, 0x8}, 0x14) ioctl(r3, 0x8973, &(0x7f0000000a80)="942cb8346026aabcb0242f272887277a68073b51b25df53fda1eaa38f1ccfe35222910c8ac366403a6b24ff6faae04c6769bfd222d5fd499469b96d897bd06919feb49b9830064aee542dcc1825877ff2e0e12e1b0aca013d260f3b875e2fdfc51ea571f22feafc368759368dcc569a15e1ac29d92401eeb313d2059c2a8a859991ceb5850c73567c27b2853660f3296f1dbccbece") write$apparmor_exec(r3, &(0x7f0000000b40)={'stack ', 'posix_acl_access\x00'}, 0x17) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) write$UHID_CREATE2(r4, &(0x7f0000000c00)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0xb5, 0xffffffff, 0x9, 0x1, 0x2, 0xce, "77eb145454fa0d7d1918a1c60dbcf3d10360bfebed6442b5ada4b081c486a6e233806d088d8623dec8419e36f1d0669a405aad3109cf7f2f10ec26bcb4adf32e5ca977670a666ee1632f46f47976416a7e4f31c2647d87202269240cebd669da8ff6c83d27dfc093b1c22525d73db0bceda3f208e63d57127dce65c33c42d2dfd52daff703aa19bde5837de7a15edafc5252d20327e29d40db9ccb743749df8636b5963bc75ac4803cccdd4b9263b241c0afcd6ab1"}, 0x1cd) accept4$packet(r4, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14, 0x80800) r6 = add_key(&(0x7f0000000e80)='.dead\x00', &(0x7f0000000ec0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, r6, 0x0, &(0x7f0000000f00)='stack ') ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000f40)) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000001080)={0x9, 0x3f}) write$selinux_attr(r0, &(0x7f00000010c0)='system_u:object_r:ssh_keygen_exec_t:s0\x00', 0x27) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) socket$pppoe(0x18, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000001100)='veth1_to_hsr\x00', 0x10) r7 = open(&(0x7f0000001140)='./file0\x00', 0x8000, 0x114) socket$inet_udplite(0x2, 0x2, 0x88) setns(r7, 0x4000000) 03:03:36 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 413.040145] protocol 88fb is buggy, dev hsr_slave_0 [ 413.045346] protocol 88fb is buggy, dev hsr_slave_1 [ 413.065263] audit: type=1400 audit(1565233416.986:97): avc: denied { setopt } for pid=21872 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:03:37 executing program 4: ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000140)={0x0, 0x5, 0x0, 0x10000, 0x1}) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x100000000, 0x0, {"169a3200261b8077638d8236a678aec9"}, 0x4}}}, 0xa0) unshare(0x2040400) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, &(0x7f0000000040), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x10000, 0x0) fchdir(r0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000180)={'netdevsim0\x00', @local}) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000002c0)={0x4, 0xd, 0x4, 0x2020809, {}, {0x3, 0x0, 0x80000001, 0x101, 0x3f, 0x9, "d0b5d7e6"}, 0x20, 0x7, @offset=0x8, 0x4}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000000)={0x1ff, 0x1, 0x0, 0x62, 0x9, 0x7cd82f7b, 0x2}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\xff\x01\x00\x00\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 413.120100] protocol 88fb is buggy, dev hsr_slave_0 [ 413.125231] protocol 88fb is buggy, dev hsr_slave_1 03:03:37 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x200000000bd, @time={0x0, 0x1c9c380}}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0xfffffffffffffffd, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRESOCT], 0x29) socket$inet6(0xa, 0x80005, 0xd03) recvmmsg(r1, &(0x7f0000000000), 0x0, 0x0, 0x0) [ 413.677576] audit: type=1400 audit(1565233417.596:98): avc: denied { ioctl } for pid=21897 comm="syz-executor.4" path="socket:[73097]" dev="sockfs" ino=73097 ioctlcmd=0x5665 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 413.729839] bond0: Releasing backup interface bond_slave_1 03:03:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getroute={0x1c, 0x1a, 0x204, 0x70bd2a, 0x25dfdbfe, {0x2, 0x14, 0x90, 0xff, 0xff, 0x4, 0xfd, 0x1, 0x2000}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x10) r2 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffc, 0x40) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x100000000, 0x4, 0x5, 0x8, 0xfb96, 0x4e, 0xfff, {0x0, @in={{0x2, 0x3, @multicast2}}, 0x0, 0xa7, 0x3, 0x4d0, 0x5}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000340)={r3, 0x81, 0x62ff}, 0x8) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x40000000000012f, 0x0) 03:03:37 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900019208000000002208f6f00061"], 0x2c}}, 0x0) exit_group(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x6, 0x10, 0x81, 0x2}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xe, 0x0, 0x1f, 0x101, 0xa1}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x101, @ipv4={[], [], @multicast1}, 0x4}}, 0x1, 0x4}, &(0x7f0000000200)=0x90) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40081, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0385720, &(0x7f0000000040)={0x1, {0x0, 0x989680}, 0xfffffffffffffff7, 0xff}) 03:03:37 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40a85323, &(0x7f00000000c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x6) 03:03:37 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0xffffffffffffffff, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 413.945796] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 03:03:38 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getroute={0x1c, 0x1a, 0x204, 0x70bd2a, 0x25dfdbfe, {0x2, 0x14, 0x90, 0xff, 0xff, 0x4, 0xfd, 0x1, 0x2000}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x10) r2 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffc, 0x40) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x100000000, 0x4, 0x5, 0x8, 0xfb96, 0x4e, 0xfff, {0x0, @in={{0x2, 0x3, @multicast2}}, 0x0, 0xa7, 0x3, 0x4d0, 0x5}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000340)={r3, 0x81, 0x62ff}, 0x8) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x40000000000012f, 0x0) 03:03:38 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getroute={0x1c, 0x1a, 0x204, 0x70bd2a, 0x25dfdbfe, {0x2, 0x14, 0x90, 0xff, 0xff, 0x4, 0xfd, 0x1, 0x2000}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x10) r2 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffc, 0x40) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x100000000, 0x4, 0x5, 0x8, 0xfb96, 0x4e, 0xfff, {0x0, @in={{0x2, 0x3, @multicast2}}, 0x0, 0xa7, 0x3, 0x4d0, 0x5}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000340)={r3, 0x81, 0x62ff}, 0x8) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x40000000000012f, 0x0) 03:03:38 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0xffffffffffffffff, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:38 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/s\xc7\xdf;\"H\xe4\bvync_version\x00h\xa8\x85\x865v>\x17\xcb\xfc\x8c(\x1b\xf1\xcf\x94FLYN\xfa\x88*\xb9\x1e+\x8b\r\x8d\xc0\xacE\x9d\x8eV\xec1\xbc', 0x2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000040)={0x0, 0x7f, 0x4, 0x2, 0xfffffffffffffff8}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) write$P9_RXATTRCREATE(r2, &(0x7f0000000000)={0x7, 0x21, 0x2}, 0x7) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:38 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x5a2c39bbe2be27e5, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x20000) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x204000) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x100000001, 0xffffffff000}, 0x14) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x80000000000000bd) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000240)=0x1) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffffffffffefd, 0x1, &(0x7f0000000180), 0x10000000000000a2) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r3, 0x0, 0xe, &(0x7f0000000100)='[em1(-cpuset-\x00', 0xffffffffffffffff}, 0x30) setpriority(0x2, r6, 0x0) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_PIE_OFF(r7, 0x7006) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000]}, 0x2c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) 03:03:38 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0xffffffffffffffff, r1, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:38 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900019208000000002208f6f00061"], 0x2c}}, 0x0) exit_group(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x6, 0x10, 0x81, 0x2}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xe, 0x0, 0x1f, 0x101, 0xa1}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x101, @ipv4={[], [], @multicast1}, 0x4}}, 0x1, 0x4}, &(0x7f0000000200)=0x90) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40081, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0385720, &(0x7f0000000040)={0x1, {0x0, 0x989680}, 0xfffffffffffffff7, 0xff}) 03:03:38 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x0, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000080)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x4000000001c, &(0x7f0000000280)={@remote}, 0x14) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000000c0)) 03:03:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100180000000000000010000000100000000c00000010000000000000010000000060d863bb9d04ba70858090acc420002d0c00005f61305f2e6f2e006100"], &(0x7f00000001c0)=""/187, 0x34, 0xbb, 0x80000001}, 0x20) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @null, @default, @netrom, @null, @rose, @rose, @null]}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xb, &(0x7f00000000c0)=0x8, 0x4) listen(r0, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x50000, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r2) unshare(0x40000000) r4 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000180)=@ccm_128={{0x304}, "2b30f930b0c95feb", "46a6a755ae52539c3b51a4d87de0273b", "da485d42", "9609eaeec6c80b5f"}, 0x28) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) [ 414.861049] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 03:03:38 executing program 4: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001900)='/dev/video1\x00', 0x2, 0x0) tee(r0, r1, 0x3, 0x4) r2 = syz_open_dev$sndctrl(&(0x7f0000001980)='/dev/snd/controlC#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000400)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x8, &(0x7f0000000540)=[{&(0x7f0000000080)="cd7f7b358bc2730ea5420574f5d887a845", 0x11, 0x2}, {&(0x7f00000000c0)="66487f3ff1f9076c158e5183b3c902b845894164ff66c42a8954f71cf93692fa2dc906a5b4d0176cf3fc501a62175e698b197409e547f238eced73fe4075ee1a0268599059c00cc0208880b2ac9844f584e3fa18981bfbc303c70c88d8466e234b32f6728c944cffcb348b9d5dc0219532772b02841ba374e4657fc71445ca2123b19cd853a0123501e7171f14d9ff01bed69d5c521fc2c4ec5456f6f6df5b0bb16dc5ec383c8372218c11c5000273a0f9eeedd9a87f154e5dde268f4669b9756fcf1bfcb06c813757088897fc5a5803514591da5e8a", 0xd6, 0xfff}, {&(0x7f0000000740)="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", 0x1000, 0xff}, {&(0x7f00000001c0)="16546feed7694074d585c50137dd33bdd903a3c99d7ef0902149f96723885cd5b94cc5f91950b2f608c6f174999c8a1427542063b24dae9891fefdc64b9a56ac8419991171a1f115a5971b94738c120c27f94898f4573aa2299bd909a785d6272eeb03f81b0e56ae", 0x68, 0x100000000}, {&(0x7f0000000240)="79ec1a80207693ddf4cdd08d97604f0467303c58e078217cccef8285bfd97ba25f7ba809f836578183977dd3f7a15dc431ef15de4189b310e81b02c57e8e19384d9e62b15aaafa4b25121ffe7806865dbc8df6dca02cdccde4729d73f308b305ff81526ad0a5493cc58e05d40ea9771459369b4bf6c9f6cbb216bd261c4f299e89b5f2adcc2b9f9d1c7194e5e209817c1ead5e9e333f86c12fade018a924a3302c8f85e1868ea9db90e23df50456a0dc42b881ec48a1954b7dba05b8", 0xbc, 0x81}, {&(0x7f0000000300)="c293f0465b24380beab878b945a4ac2bec8a5d0229a4b7c32ed323f280c84bbf9ae6ec4791631e0274a655c72e7e5d04aa80b691ef12267541ea56b639dff275035608b40fb87af96b9c0d725cbc9fd355c4b5dffdb57c43399d1f8850b0299317b07c90124cda5a8974145e7dbb619241362b2a2964e0798e05", 0x7a}, {&(0x7f0000000380)="259d04ee71b9fa962f5b8ca4919d164c3211ed55aab82e133b23aab91ad90f9d7b266ced2bb3ac97685c0b866781872b2028cb18d20f8e86a1f62c93276c7f4fcbe46af60d160d8d8deb1bc6d02ed1638ead3549fb962d08f65f364cd38e9ed335c06e166faca602d7a298e0694a8346f5", 0x71, 0x434}, {&(0x7f0000000480)="6fb8cd2cc76c111228d7a058b9656ff77bc1f319f591fdd313166acb47836c0fe5971e0dfeb86bdc2649b6392b452793e158318c346f6bb249c84052c04daaf991ccfc4e95cbcab0f8139b824afb371baf522fa46c0b1df928a855050e93f12ed50f0a4e6be6c3b2a6494fd3efbeb6b999c2511ba9bd48972585d8ed66b06e5cf772129c356bd10533d0e9b6a0bdf0572122e6dcf807e35a063696ff3953a948a724b213a92926debde242187e", 0xad, 0x1000}], 0x4005, &(0x7f00000019c0)=ANY=[@ANYBLOB="6d61baaf9622931f27cf4ef4f08158736b3d5e4d41595f415050454e442c657569643c", @ANYRESDEC=r3, @ANYBLOB=',seclabel,smackfsdef=syz1\x00,measure,func=KEXEC_KERNEL_CHECK,\x00']) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000600)={{0xb, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 03:03:38 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x101000, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d801}) recvmmsg(r0, &(0x7f00000064c0), 0x400000000000254, 0x2, 0x0) [ 415.186436] IPVS: ftp: loaded support on port[0] = 21 03:03:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) inotify_init1(0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$caif_stream(0x25, 0x1, 0x2) r0 = gettid() r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000140)=r0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2d) ptrace$cont(0x18, r0, 0x0, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x800, 0x82) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000080)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x3) 03:03:39 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000000)={{}, {}, 0x0, 0x40000000000000, 0x82}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 03:03:39 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000100)={0x1f, {0x0, 0x8000000, 0x0, 0x1, 0x9}}, 0xff37) sendfile(r1, r0, &(0x7f0000000140)=0x15, 0xff) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x7) r3 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x8, 0x88040) ioctl$TIOCNOTTY(r3, 0x5422) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e23, 0xfffffffffffffff9, @rand_addr="cafaa4ce2f37a132bc59ecac25f49e7d", 0x2115516f}}, 0x0, 0x9, 0x0, "e48ec9eeeb25b213b5b497bededf8c6a0ae9383c0daa6c5e15066bd2c18c824859f8f22e20f0c79f61261d3fdd9cdb681d99281760b79d40ad893b8aec1e40fe8aa4df9c5a5312a86f2b46517170e24c"}, 0xd8) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000040)) r4 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40001) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000300), 0x8) r5 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCATTCHAN(r5, 0x40047438, &(0x7f00000000c0)) accept(r1, 0x0, 0x0) [ 415.657925] INFO: trying to register non-static key. [ 415.663104] the code is fine but needs lockdep annotation. [ 415.668716] turning off the locking correctness validator. [ 415.674335] CPU: 0 PID: 22036 Comm: syz-executor.4 Not tainted 4.14.137 #33 [ 415.681449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.690998] Call Trace: [ 415.702445] dump_stack+0x138/0x19c [ 415.703085] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 415.706195] register_lock_class+0x2fd/0x1730 [ 415.706204] ? check_noncircular+0x20/0x20 [ 415.706211] __lock_acquire+0x147/0x4620 [ 415.706222] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 415.718806] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 415.721575] ? unwind_next_frame.part.0+0x188/0x8b0 [ 415.721584] ? lock_downgrade+0x6e0/0x6e0 [ 415.721592] ? check_preemption_disabled+0x3c/0x250 [ 415.721598] ? bpf_prog_kallsyms_find+0x39/0x280 [ 415.721604] ? trace_hardirqs_on+0x10/0x10 [ 415.721609] ? is_bpf_text_address+0xa6/0x120 [ 415.721616] ? kernel_text_address+0x73/0xf0 [ 415.721621] ? __unwind_start+0x1f6/0x3d0 [ 415.721627] ? __kernel_text_address+0xd/0x40 [ 415.721633] ? unwind_get_return_address+0x61/0xa0 [ 415.721639] ? __save_stack_trace+0x7b/0xd0 [ 415.721644] ? __lock_acquire+0x5f7/0x4620 [ 415.721653] lock_acquire+0x16f/0x430 [ 415.798828] ? flush_work+0x84/0x730 [ 415.802540] flush_work+0xae/0x730 [ 415.806074] ? flush_work+0x84/0x730 [ 415.809777] ? insert_work+0x320/0x320 [ 415.813658] ? trace_hardirqs_on+0x10/0x10 [ 415.817906] ? trace_hardirqs_on+0x10/0x10 [ 415.822134] ? mark_held_locks+0xb1/0x100 [ 415.826284] ? __cancel_work_timer+0x166/0x480 [ 415.830857] __cancel_work_timer+0x2f0/0x480 [ 415.835257] ? cancel_delayed_work+0x20/0x20 [ 415.839654] ? trace_hardirqs_on_caller+0x400/0x590 [ 415.844666] ? release_sock+0x14a/0x1b0 [ 415.848639] ? trace_hardirqs_on+0xd/0x10 [ 415.852789] ? smc_accept_dequeue+0x3b6/0x5e0 [ 415.857368] ? __local_bh_enable_ip+0x99/0x1a0 [ 415.861950] cancel_work_sync+0x18/0x20 [ 415.865927] smc_close_active+0x68e/0xba0 [ 415.870071] smc_release+0x45a/0x630 [ 415.873783] __sock_release+0xce/0x2b0 [ 415.877689] ? __sock_release+0x2b0/0x2b0 [ 415.881838] sock_close+0x1b/0x30 [ 415.885284] __fput+0x275/0x7a0 [ 415.888556] ____fput+0x16/0x20 [ 415.891828] task_work_run+0x114/0x190 [ 415.895711] exit_to_usermode_loop+0x1da/0x220 [ 415.900288] do_syscall_64+0x4bc/0x640 [ 415.904177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.909022] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 415.914204] RIP: 0033:0x413511 [ 415.917384] RSP: 002b:00007fff6c9d8220 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 415.925081] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 415.932430] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 415.939762] RBP: 0000000000000001 R08: 0000000010745ce5 R09: 0000000010745ce9 [ 415.947028] R10: 00007fff6c9d8300 R11: 0000000000000293 R12: 000000000075bf20 03:03:39 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x0, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 415.954292] R13: 00000000000657a9 R14: 0000000000760b28 R15: ffffffffffffffff [ 415.969988] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 415.984157] kobject: 'loop5' (ffff8880a4a9d3a0): kobject_uevent_env [ 415.992747] kobject: 'loop5' (ffff8880a4a9d3a0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:03:39 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900019208000000002208f6f00061"], 0x2c}}, 0x0) exit_group(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x6, 0x10, 0x81, 0x2}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xe, 0x0, 0x1f, 0x101, 0xa1}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x101, @ipv4={[], [], @multicast1}, 0x4}}, 0x1, 0x4}, &(0x7f0000000200)=0x90) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40081, 0x0) 03:03:39 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 416.007723] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 416.017069] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 416.029585] kobject: 'loop2' (ffff8880a491c120): kobject_uevent_env [ 416.037821] kobject: 'loop2' (ffff8880a491c120): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 416.041108] IPVS: ftp: loaded support on port[0] = 21 [ 416.065194] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 416.065548] kobject: 'loop5' (ffff8880a4a9d3a0): kobject_uevent_env [ 416.085576] kobject: 'loop5' (ffff8880a4a9d3a0): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:03:40 executing program 4: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000440)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@loopback, 0x100000066, r3}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[]}}, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) sendto$inet6(r0, &(0x7f0000000480)="368c6fd387e42aa131877e7687ecd16b52a5f0da7fc01ed2e98a4958f06047ca184550a943c4e2c4491d51066d2cd788690d7a61b329eba3d71e38422ee3d524401268864af19e0d74e42e63cf4409802865e53782fd88d1cdaa948ed6b49df23deb070ac3363b84cf419bd50896aa5750931228db923e712f0923165a17d5d819c548be4f9bcc2a21df118d13bdea83d8c1243696ccdee4a600f8e8c53dc2b7779288e361059bd8130ebc98fca43b6b912bb66375b27889a12f4f", 0xbb, 0x4, 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000840)=""/4096, 0x1000, 0x40, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x200, 0x6, @remote}, 0x14) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000780)=""/152) [ 416.147266] kobject: 'loop4' (ffff8880a4a62aa0): kobject_uevent_env [ 416.177868] kobject: 'loop4' (ffff8880a4a62aa0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 416.194906] kobject: 'kvm' (ffff8880a6e9d450): kobject_uevent_env [ 416.220320] kobject: 'kvm' (ffff8880a6e9d450): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 416.257826] kobject: 'kvm' (ffff8880a6e9d450): kobject_uevent_env [ 416.268874] kobject: 'kvm' (ffff8880a6e9d450): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 416.302072] kobject: 'lo' (ffff88805e645230): kobject_add_internal: parent: 'net', set: 'devices' [ 416.323481] kobject: 'kvm' (ffff8880a6e9d450): kobject_uevent_env [ 416.328059] kobject: 'lo' (ffff88805e645230): kobject_uevent_env [ 416.329771] kobject: 'kvm' (ffff8880a6e9d450): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 416.358719] kobject: 'lo' (ffff88805e645230): fill_kobj_path: path = '/devices/virtual/net/lo' [ 416.397324] kobject: 'queues' (ffff88809bc8b548): kobject_add_internal: parent: 'lo', set: '' [ 416.436843] kobject: 'queues' (ffff88809bc8b548): kobject_uevent_env 03:03:40 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) tee(r1, r1, 0xffffffff, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) [ 416.460493] kobject: 'queues' (ffff88809bc8b548): kobject_uevent_env: filter function caused the event to drop! [ 416.500322] kobject: 'kvm' (ffff8880a6e9d450): kobject_uevent_env [ 416.509941] kobject: 'loop0' (ffff8880a49246a0): kobject_uevent_env [ 416.512558] kobject: 'rx-0' (ffff888090142e50): kobject_add_internal: parent: 'queues', set: 'queues' [ 416.519485] kobject: 'loop0' (ffff8880a49246a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 416.527569] kobject: 'kvm' (ffff8880a6e9d450): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 416.542665] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 416.572853] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 416.578717] kobject: 'rx-0' (ffff888090142e50): kobject_uevent_env [ 416.609437] kobject: 'rx-0' (ffff888090142e50): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 416.623075] kobject: 'loop4' (ffff8880a4a62aa0): kobject_uevent_env [ 416.626527] kobject: 'tx-0' (ffff88809a5d3818): kobject_add_internal: parent: 'queues', set: 'queues' [ 416.639268] kobject: 'loop4' (ffff8880a4a62aa0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 416.641075] kobject: 'tx-0' (ffff88809a5d3818): kobject_uevent_env [ 416.653172] kobject: 'loop5' (ffff8880a4a9d3a0): kobject_uevent_env [ 416.655476] kobject: 'tx-0' (ffff88809a5d3818): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 416.663732] kobject: 'loop5' (ffff8880a4a9d3a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 416.687564] kobject: 'loop2' (ffff8880a491c120): kobject_uevent_env [ 416.696076] kobject: 'loop2' (ffff8880a491c120): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 417.040129] net_ratelimit: 18 callbacks suppressed [ 417.040135] protocol 88fb is buggy, dev hsr_slave_0 [ 417.050183] protocol 88fb is buggy, dev hsr_slave_1 [ 417.180232] kobject: 'tunl0' (ffff888055e386b0): kobject_add_internal: parent: 'net', set: 'devices' [ 417.190441] kobject: 'tunl0' (ffff888055e386b0): kobject_uevent_env [ 417.196878] kobject: 'tunl0' (ffff888055e386b0): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 417.206244] protocol 88fb is buggy, dev hsr_slave_0 [ 417.206283] protocol 88fb is buggy, dev hsr_slave_1 [ 417.216568] kobject: 'queues' (ffff88809c0c3048): kobject_add_internal: parent: 'tunl0', set: '' [ 417.226083] kobject: 'queues' (ffff88809c0c3048): kobject_uevent_env [ 417.232583] kobject: 'queues' (ffff88809c0c3048): kobject_uevent_env: filter function caused the event to drop! [ 417.242857] kobject: 'rx-0' (ffff888097f87190): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.252257] kobject: 'rx-0' (ffff888097f87190): kobject_uevent_env [ 417.258569] kobject: 'rx-0' (ffff888097f87190): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 417.269084] kobject: 'tx-0' (ffff888090708a98): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.278580] kobject: 'tx-0' (ffff888090708a98): kobject_uevent_env [ 417.280100] protocol 88fb is buggy, dev hsr_slave_0 [ 417.284930] kobject: 'tx-0' (ffff888090708a98): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 417.289940] protocol 88fb is buggy, dev hsr_slave_1 [ 417.300990] kobject: 'gre0' (ffff8880546a08f0): kobject_add_internal: parent: 'net', set: 'devices' [ 417.305231] protocol 88fb is buggy, dev hsr_slave_0 [ 417.315019] kobject: 'gre0' (ffff8880546a08f0): kobject_uevent_env [ 417.319399] protocol 88fb is buggy, dev hsr_slave_1 [ 417.325707] kobject: 'gre0' (ffff8880546a08f0): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 417.340162] kobject: 'queues' (ffff8880a72f3248): kobject_add_internal: parent: 'gre0', set: '' [ 417.348904] kobject: 'loop0' (ffff8880a49246a0): kobject_uevent_env [ 417.349543] kobject: 'queues' (ffff8880a72f3248): kobject_uevent_env [ 417.358119] kobject: 'loop0' (ffff8880a49246a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 417.363000] kobject: 'queues' (ffff8880a72f3248): kobject_uevent_env: filter function caused the event to drop! [ 417.382723] kobject: 'rx-0' (ffff8880a90c6790): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.392205] kobject: 'rx-0' (ffff8880a90c6790): kobject_uevent_env [ 417.398558] kobject: 'rx-0' (ffff8880a90c6790): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 417.408977] kobject: 'tx-0' (ffff888081c41558): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.418455] kobject: 'tx-0' (ffff888081c41558): kobject_uevent_env [ 417.424808] kobject: 'tx-0' (ffff888081c41558): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 417.435550] kobject: 'gretap0' (ffff8880475b91b0): kobject_add_internal: parent: 'net', set: 'devices' [ 417.445561] kobject: 'gretap0' (ffff8880475b91b0): kobject_uevent_env [ 417.452276] kobject: 'gretap0' (ffff8880475b91b0): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 417.462176] kobject: 'queues' (ffff88809bc8b748): kobject_add_internal: parent: 'gretap0', set: '' [ 417.471839] kobject: 'queues' (ffff88809bc8b748): kobject_uevent_env [ 417.478313] kobject: 'queues' (ffff88809bc8b748): kobject_uevent_env: filter function caused the event to drop! [ 417.488569] kobject: 'rx-0' (ffff88809b891790): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.497981] kobject: 'rx-0' (ffff88809b891790): kobject_uevent_env [ 417.504343] kobject: 'rx-0' (ffff88809b891790): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 417.514978] kobject: 'tx-0' (ffff88809c1d4a58): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.524494] kobject: 'tx-0' (ffff88809c1d4a58): kobject_uevent_env [ 417.530864] kobject: 'tx-0' (ffff88809c1d4a58): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 417.542018] kobject: 'batman_adv' (ffff888085083780): kobject_add_internal: parent: 'gretap0', set: '' [ 417.552302] kobject: 'erspan0' (ffff88805c590cb0): kobject_add_internal: parent: 'net', set: 'devices' [ 417.562266] kobject: 'erspan0' (ffff88805c590cb0): kobject_uevent_env [ 417.568865] kobject: 'erspan0' (ffff88805c590cb0): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 417.578838] kobject: 'queues' (ffff88805a58f748): kobject_add_internal: parent: 'erspan0', set: '' [ 417.588528] kobject: 'queues' (ffff88805a58f748): kobject_uevent_env [ 417.595053] kobject: 'queues' (ffff88805a58f748): kobject_uevent_env: filter function caused the event to drop! [ 417.605320] kobject: 'rx-0' (ffff88809615d550): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.614771] kobject: 'rx-0' (ffff88809615d550): kobject_uevent_env [ 417.621128] kobject: 'rx-0' (ffff88809615d550): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 417.631795] kobject: 'tx-0' (ffff8880949c2818): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.641372] kobject: 'tx-0' (ffff8880949c2818): kobject_uevent_env [ 417.647701] kobject: 'tx-0' (ffff8880949c2818): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 417.658773] kobject: 'batman_adv' (ffff8880971e1700): kobject_add_internal: parent: 'erspan0', set: '' [ 417.669070] kobject: 'ip_vti0' (ffff88805cd0ceb0): kobject_add_internal: parent: 'net', set: 'devices' [ 417.679050] kobject: 'ip_vti0' (ffff88805cd0ceb0): kobject_uevent_env [ 417.685660] kobject: 'ip_vti0' (ffff88805cd0ceb0): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 417.695671] kobject: 'queues' (ffff88805a58f348): kobject_add_internal: parent: 'ip_vti0', set: '' [ 417.705355] kobject: 'queues' (ffff88805a58f348): kobject_uevent_env [ 417.711868] kobject: 'queues' (ffff88805a58f348): kobject_uevent_env: filter function caused the event to drop! [ 417.722121] kobject: 'rx-0' (ffff888085b70550): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.731557] kobject: 'rx-0' (ffff888085b70550): kobject_uevent_env [ 417.737909] kobject: 'rx-0' (ffff888085b70550): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 417.748582] kobject: 'tx-0' (ffff888083dc1818): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.758076] kobject: 'tx-0' (ffff888083dc1818): kobject_uevent_env [ 417.765232] kobject: 'tx-0' (ffff888083dc1818): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 417.776499] kobject: 'ip6_vti0' (ffff88805d8df0f0): kobject_add_internal: parent: 'net', set: 'devices' [ 417.786469] kobject: 'ip6_vti0' (ffff88805d8df0f0): kobject_uevent_env [ 417.793185] kobject: 'ip6_vti0' (ffff88805d8df0f0): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 417.803233] kobject: 'queues' (ffff88805a58f048): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 417.813087] kobject: 'queues' (ffff88805a58f048): kobject_uevent_env [ 417.819581] kobject: 'queues' (ffff88805a58f048): kobject_uevent_env: filter function caused the event to drop! [ 417.829842] kobject: 'rx-0' (ffff88809ba85610): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.839302] kobject: 'rx-0' (ffff88809ba85610): kobject_uevent_env [ 417.845663] kobject: 'rx-0' (ffff88809ba85610): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 417.856460] kobject: 'tx-0' (ffff88809fe230d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.865984] kobject: 'tx-0' (ffff88809fe230d8): kobject_uevent_env [ 417.872354] kobject: 'tx-0' (ffff88809fe230d8): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 417.883588] kobject: 'sit0' (ffff88805be392f0): kobject_add_internal: parent: 'net', set: 'devices' [ 417.893205] kobject: 'sit0' (ffff88805be392f0): kobject_uevent_env [ 417.910695] kobject: 'sit0' (ffff88805be392f0): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 417.919983] kobject: 'queues' (ffff88807f4ffd48): kobject_add_internal: parent: 'sit0', set: '' [ 417.929410] kobject: 'queues' (ffff88807f4ffd48): kobject_uevent_env [ 417.935924] kobject: 'queues' (ffff88807f4ffd48): kobject_uevent_env: filter function caused the event to drop! [ 417.946193] kobject: 'rx-0' (ffff88808f58e9d0): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.955595] kobject: 'rx-0' (ffff88808f58e9d0): kobject_uevent_env [ 417.961956] kobject: 'rx-0' (ffff88808f58e9d0): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 417.972302] kobject: 'tx-0' (ffff88809655b5d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 417.981882] kobject: 'tx-0' (ffff88809655b5d8): kobject_uevent_env [ 417.988218] kobject: 'tx-0' (ffff88809655b5d8): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 417.999172] kobject: 'ip6tnl0' (ffff888055dae5f0): kobject_add_internal: parent: 'net', set: 'devices' [ 418.009312] kobject: 'ip6tnl0' (ffff888055dae5f0): kobject_uevent_env [ 418.015946] kobject: 'ip6tnl0' (ffff888055dae5f0): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 418.025781] kobject: 'queues' (ffff88809929fb48): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 418.035434] kobject: 'queues' (ffff88809929fb48): kobject_uevent_env [ 418.041930] kobject: 'queues' (ffff88809929fb48): kobject_uevent_env: filter function caused the event to drop! [ 418.052195] kobject: 'rx-0' (ffff8880a13fe550): kobject_add_internal: parent: 'queues', set: 'queues' [ 418.061765] kobject: 'rx-0' (ffff8880a13fe550): kobject_uevent_env [ 418.068084] kobject: 'rx-0' (ffff8880a13fe550): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 418.078757] kobject: 'tx-0' (ffff88808c0da7d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 418.088256] protocol 88fb is buggy, dev hsr_slave_0 [ 418.088295] protocol 88fb is buggy, dev hsr_slave_1 [ 418.098519] kobject: 'tx-0' (ffff88808c0da7d8): kobject_uevent_env [ 418.104930] kobject: 'tx-0' (ffff88808c0da7d8): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 418.116224] kobject: 'ip6gre0' (ffff8880a1f5e6b0): kobject_add_internal: parent: 'net', set: 'devices' [ 418.126148] kobject: 'ip6gre0' (ffff8880a1f5e6b0): kobject_uevent_env [ 418.132767] kobject: 'ip6gre0' (ffff8880a1f5e6b0): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 418.142585] kobject: 'queues' (ffff88809fc19748): kobject_add_internal: parent: 'ip6gre0', set: '' [ 418.152247] kobject: 'queues' (ffff88809fc19748): kobject_uevent_env [ 418.158731] kobject: 'queues' (ffff88809fc19748): kobject_uevent_env: filter function caused the event to drop! [ 418.169015] kobject: 'rx-0' (ffff888090142550): kobject_add_internal: parent: 'queues', set: 'queues' [ 418.178436] kobject: 'rx-0' (ffff888090142550): kobject_uevent_env [ 418.184828] kobject: 'rx-0' (ffff888090142550): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 418.195480] kobject: 'tx-0' (ffff88808558c0d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 418.204965] kobject: 'tx-0' (ffff88808558c0d8): kobject_uevent_env [ 418.211331] kobject: 'tx-0' (ffff88808558c0d8): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' 03:03:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d8, 0x0) 03:03:42 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x0, 0x62) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:42 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, 0x0, 0x80000000, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:42 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x3f, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510d, 0x0) 03:03:42 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900019208000000002208f6f00061"], 0x2c}}, 0x0) exit_group(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x6, 0x10, 0x81, 0x2}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xe, 0x0, 0x1f, 0x101, 0xa1}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x101, @ipv4={[], [], @multicast1}, 0x4}}, 0x1, 0x4}, &(0x7f0000000200)=0x90) 03:03:42 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1000, 0x4000) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x400000) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000200)={0x3, r3}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) [ 418.232144] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env [ 418.238840] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 418.265906] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env 03:03:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000020000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 03:03:42 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000080)=""/142) [ 418.277614] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:03:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)={0x20, 0x0, 0x0, 0x0, 0x0, "", [@generic="f9ad75c6dd216e5b9eafda64d1"]}, 0x20}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/90, 0x5a}], 0x1}, 0x0) 03:03:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r0, r1, 0x0, 0x5) [ 418.317788] kobject: 'loop5' (ffff8880a4a9d3a0): kobject_uevent_env [ 418.335078] kobject: 'loop5' (ffff8880a4a9d3a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 418.351483] kobject: 'loop4' (ffff8880a4a62aa0): kobject_uevent_env 03:03:42 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x0) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 418.369713] kobject: 'loop4' (ffff8880a4a62aa0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 418.385787] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env 03:03:42 executing program 4: r0 = socket(0x15, 0x805, 0x0) getsockopt(r0, 0x114, 0x271b, 0x0, &(0x7f0000000140)) 03:03:42 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)) [ 418.411821] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:03:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x20}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") [ 418.463193] kobject: 'loop4' (ffff8880a4a62aa0): kobject_uevent_env [ 418.483302] kobject: 'loop4' (ffff8880a4a62aa0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 418.512832] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env [ 418.552022] kobject: 'rx-0' (ffff8880972f5250): kobject_cleanup, parent ffff88808017cc48 [ 418.555757] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 418.569018] kobject: 'rx-0' (ffff8880972f5250): auto cleanup 'remove' event [ 418.600819] kobject: 'rx-0' (ffff8880972f5250): kobject_uevent_env [ 418.605673] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 418.625122] kobject: 'rx-0' (ffff8880972f5250): kobject_uevent_env: uevent_suppress caused the event to drop! [ 418.635491] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 418.663009] kobject: 'rx-0' (ffff8880972f5250): auto cleanup kobject_del [ 418.670979] kobject: 'loop4' (ffff8880a4a62aa0): kobject_uevent_env [ 418.692809] kobject: 'rx-0' (ffff8880972f5250): calling ktype release [ 418.696049] kobject: 'loop4' (ffff8880a4a62aa0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 418.718996] kobject: 'rx-0': free name [ 418.737670] kobject: 'tx-0' (ffff88809630d558): kobject_cleanup, parent ffff88808017cc48 [ 418.744119] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env [ 418.770651] kobject: 'tx-0' (ffff88809630d558): auto cleanup 'remove' event [ 418.775564] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 418.799472] kobject: 'tx-0' (ffff88809630d558): kobject_uevent_env [ 418.819847] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 418.822366] kobject: 'tx-0' (ffff88809630d558): kobject_uevent_env: uevent_suppress caused the event to drop! [ 418.842101] kobject: 'tx-0' (ffff88809630d558): auto cleanup kobject_del [ 418.843629] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 418.849042] kobject: 'tx-0' (ffff88809630d558): calling ktype release [ 418.868526] kobject: 'tx-0': free name [ 418.872505] kobject: 'queues' (ffff88808017cc48): kobject_cleanup, parent (null) [ 418.889176] kobject: 'queues' (ffff88808017cc48): calling ktype release 03:03:42 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r1, 0x0, 0x62) dup(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "af3d85a825b3b1ffbe265e69fb709219b5bc9c"}, 0x14, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 419.353204] kobject: 'queues' (ffff88808017cc48): kset_release [ 419.359837] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env [ 419.365131] kobject: 'queues': free name [ 419.372948] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 419.373669] kobject: 'loop5' (ffff8880a4a9d3a0): kobject_uevent_env [ 419.384435] kobject: 'loop5' (ffff8880a4a9d3a0): kobject_uevent_env [ 419.398819] kobject: 'loop5' (ffff8880a4a9d3a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 419.403895] kobject: 'ip6gre0' (ffff88805d7de9b0): kobject_uevent_env [ 419.415704] kobject: 'loop5' (ffff8880a4a9d3a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 419.416279] kobject: 'loop0' (ffff8880a49246a0): kobject_uevent_env [ 419.425935] kobject: 'ip6gre0' (ffff88805d7de9b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 419.434879] kobject: 'loop0' (ffff8880a49246a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 419.456604] kobject: 'batman_adv' (ffff8880918c0f80): kobject_uevent_env [ 419.457575] kobject: 'loop5' (ffff8880a4a9d3a0): kobject_uevent_env [ 419.469956] kobject: 'loop5' (ffff8880a4a9d3a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 419.470314] kobject: 'batman_adv' (ffff8880918c0f80): kobject_uevent_env: filter function caused the event to drop! [ 419.481582] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 419.490618] kobject: 'batman_adv' (ffff8880918c0f80): kobject_cleanup, parent (null) [ 419.500745] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 419.506081] kobject: 'batman_adv' (ffff8880918c0f80): calling ktype release [ 419.522878] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 419.524110] kobject: (ffff8880918c0f80): dynamic_kobj_release [ 419.529346] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 419.588252] kobject: 'batman_adv': free name [ 419.601416] kobject: 'rx-0' (ffff8880a5bdd0d0): kobject_cleanup, parent ffff8880984fa148 [ 419.605362] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 419.610414] kobject: 'rx-0' (ffff8880a5bdd0d0): auto cleanup 'remove' event [ 419.629525] kobject: 'rx-0' (ffff8880a5bdd0d0): kobject_uevent_env 03:03:43 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00000003060d01ff0488fffdffff57ffccad000c000100060d0010091900019208000000002208f6f00061"], 0x2c}}, 0x0) exit_group(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x6, 0x10, 0x81, 0x2}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xe, 0x0, 0x1f, 0x101, 0xa1}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x101, @ipv4={[], [], @multicast1}, 0x4}}, 0x1, 0x4}, &(0x7f0000000200)=0x90) 03:03:43 executing program 0: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc08c5334, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1004000000013) 03:03:43 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000040)={0x0, "7f37c313dab1a574b8de70969a851b18ce91ea773c54c1f417d3a8dec18d7984"}) 03:03:43 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="6d016e0b573be8239bc194e5552d08b2e11f16966f3e0e74ce4c919a338c4d7a484575c3b4319f69f2ec69ad44dc1a4efdee54183aec1fc78245551f51b2d7f241965832e3625b6ffb5ca1e9925ff42110948f3a8b01e3503d8c0da6ab7c290882daa342dc5dcd38ec174bad1eee65be6a8d7f"], 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f00000002c0)) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/195, 0xc3) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed1000000f9180200ef00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000140), 0x8) writev(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/119, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x5) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000400)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000280)='ns/cgroup\x00') ptrace$cont(0x29, r2, 0x80000000, 0x0) dup(r0) socket$inet(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:03:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000300)="002862b65b979db72ddcd93a6d486f8d", 0xfe6d) recvmmsg(r1, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 419.636387] kobject: 'rx-0' (ffff8880a5bdd0d0): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 419.647376] kobject: 'rx-0' (ffff8880a5bdd0d0): auto cleanup kobject_del [ 419.654441] kobject: 'rx-0' (ffff8880a5bdd0d0): calling ktype release [ 419.661046] kobject: 'rx-0': free name [ 419.664960] kobject: 'tx-0' (ffff88808f6b1318): kobject_cleanup, parent ffff8880984fa148 [ 419.680716] kobject: 'tx-0' (ffff88808f6b1318): auto cleanup 'remove' event 03:03:43 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)=0x2) r1 = epoll_create(0x40f6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ppoll(&(0x7f0000000240)=[{r1, 0xffffffffffffffff}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)={0x4000000060000001}) [ 419.688014] kobject: 'tx-0' (ffff88808f6b1318): kobject_uevent_env [ 419.694514] kobject: 'tx-0' (ffff88808f6b1318): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 419.695084] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env [ 419.705613] kobject: 'tx-0' (ffff88808f6b1318): auto cleanup kobject_del [ 419.717273] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 419.720663] kobject: 'tx-0' (ffff88808f6b1318): calling ktype release [ 419.735403] kobject: 'tx-0': free name [ 419.739457] kobject: 'queues' (ffff8880984fa148): kobject_cleanup, parent (null) [ 419.748019] kobject: 'queues' (ffff8880984fa148): calling ktype release [ 419.752580] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 419.758790] kobject: 'queues' (ffff8880984fa148): kset_release [ 419.770626] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 419.773622] kobject: 'queues': free name [ 419.789584] kobject: 'loop2' (ffff8880a491c120): kobject_uevent_env [ 419.803226] kobject: 'loop2' (ffff8880a491c120): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 419.827840] kobject: 'syz_tun' (ffff88805e2f9630): kobject_uevent_env 03:03:43 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x181, 0x0) [ 419.838684] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 419.850482] kobject: 'syz_tun' (ffff88805e2f9630): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 419.862568] kobject: 'ip6gre0' (ffff88805d7de9b0): kobject_cleanup, parent (null) [ 419.875343] kobject: 'loop4' (ffff8880a4a62aa0): kobject_uevent_env 03:03:43 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)=0x2) r1 = epoll_create(0x40f6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ppoll(&(0x7f0000000240)=[{r1, 0xffffffffffffffff}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)={0x4000000060000001}) 03:03:43 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)=0x2) r1 = epoll_create(0x40f6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ppoll(&(0x7f0000000240)=[{r1, 0xffffffffffffffff}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)={0x4000000060000001}) [ 419.886524] kobject: 'loop4' (ffff8880a4a62aa0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 419.911745] kobject: 'ip6gre0' (ffff88805d7de9b0): calling ktype release [ 419.919783] kobject: 'ip6gre0': free name 03:03:43 executing program 1: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r1 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000200)={0x9, 0xff}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) sched_setscheduler(r1, 0x1, &(0x7f00000002c0)=0x4) link(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='./file1/file0\x00') rename(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 419.925223] kobject: 'rx-0' (ffff8880972f53d0): kobject_cleanup, parent ffff88808017cf48 [ 419.925227] kobject: 'rx-0' (ffff8880972f53d0): auto cleanup 'remove' event [ 419.925231] kobject: 'rx-0' (ffff8880972f53d0): kobject_uevent_env [ 419.925236] kobject: 'rx-0' (ffff8880972f53d0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 419.925239] kobject: 'rx-0' (ffff8880972f53d0): auto cleanup kobject_del [ 419.925258] kobject: 'rx-0' (ffff8880972f53d0): calling ktype release [ 419.925261] kobject: 'rx-0': free name [ 419.925286] kobject: 'tx-0' (ffff88808ded0098): kobject_cleanup, parent ffff88808017cf48 [ 419.925289] kobject: 'tx-0' (ffff88808ded0098): auto cleanup 'remove' event [ 419.925293] kobject: 'tx-0' (ffff88808ded0098): kobject_uevent_env [ 419.925297] kobject: 'tx-0' (ffff88808ded0098): kobject_uevent_env: uevent_suppress caused the event to drop! [ 419.925300] kobject: 'tx-0' (ffff88808ded0098): auto cleanup kobject_del [ 419.925317] kobject: 'tx-0' (ffff88808ded0098): calling ktype release [ 419.925320] kobject: 'tx-0': free name [ 419.925331] kobject: 'queues' (ffff88808017cf48): kobject_cleanup, parent (null) [ 419.925334] kobject: 'queues' (ffff88808017cf48): calling ktype release [ 419.925338] kobject: 'queues' (ffff88808017cf48): kset_release [ 419.925343] kobject: 'queues': free name [ 419.925533] kobject: 'ip6tnl0' (ffff88805fddc770): kobject_uevent_env [ 419.925537] kobject: 'ip6tnl0' (ffff88805fddc770): kobject_uevent_env: uevent_suppress caused the event to drop! [ 419.925907] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env [ 419.925928] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 419.942855] kobject: 'syz_tun' (ffff88805e2f9630): kobject_cleanup, parent (null) [ 419.942859] kobject: 'syz_tun' (ffff88805e2f9630): calling ktype release [ 419.942876] kobject: 'syz_tun': free name [ 419.990267] kobject: 'ip6tnl0' (ffff88805fddc770): kobject_cleanup, parent (null) [ 419.990272] kobject: 'ip6tnl0' (ffff88805fddc770): calling ktype release [ 419.990285] kobject: 'ip6tnl0': free name [ 420.000916] kobject: 'rx-0' (ffff88805c42f910): kobject_cleanup, parent ffff88809a54bf48 [ 420.000921] kobject: 'rx-0' (ffff88805c42f910): auto cleanup 'remove' event [ 420.000925] kobject: 'rx-0' (ffff88805c42f910): kobject_uevent_env [ 420.000929] kobject: 'rx-0' (ffff88805c42f910): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.000933] kobject: 'rx-0' (ffff88805c42f910): auto cleanup kobject_del [ 420.000954] kobject: 'rx-0' (ffff88805c42f910): calling ktype release [ 420.000956] kobject: 'rx-0': free name [ 420.000984] kobject: 'tx-0' (ffff88809ed1dcd8): kobject_cleanup, parent ffff88809a54bf48 [ 420.000988] kobject: 'tx-0' (ffff88809ed1dcd8): auto cleanup 'remove' event [ 420.000992] kobject: 'tx-0' (ffff88809ed1dcd8): kobject_uevent_env [ 420.000996] kobject: 'tx-0' (ffff88809ed1dcd8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.000999] kobject: 'tx-0' (ffff88809ed1dcd8): auto cleanup kobject_del [ 420.001016] kobject: 'tx-0' (ffff88809ed1dcd8): calling ktype release [ 420.001018] kobject: 'tx-0': free name [ 420.001029] kobject: 'queues' (ffff88809a54bf48): kobject_cleanup, parent (null) [ 420.001033] kobject: 'queues' (ffff88809a54bf48): calling ktype release [ 420.001037] kobject: 'queues' (ffff88809a54bf48): kset_release [ 420.001043] kobject: 'queues': free name [ 420.001268] kobject: 'sit0' (ffff88804892f470): kobject_uevent_env [ 420.001278] kobject: 'sit0' (ffff88804892f470): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.024647] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env [ 420.024668] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 420.050522] kobject: 'sit0' (ffff88804892f470): kobject_cleanup, parent (null) [ 420.050526] kobject: 'sit0' (ffff88804892f470): calling ktype release [ 420.050539] kobject: 'sit0': free name [ 420.051092] kobject: 'rx-0' (ffff88809c296190): kobject_cleanup, parent ffff8880881adb48 [ 420.051096] kobject: 'rx-0' (ffff88809c296190): auto cleanup 'remove' event [ 420.051101] kobject: 'rx-0' (ffff88809c296190): kobject_uevent_env [ 420.051105] kobject: 'rx-0' (ffff88809c296190): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.051108] kobject: 'rx-0' (ffff88809c296190): auto cleanup kobject_del [ 420.051128] kobject: 'rx-0' (ffff88809c296190): calling ktype release [ 420.051131] kobject: 'rx-0': free name [ 420.051156] kobject: 'tx-0' (ffff888097c747d8): kobject_cleanup, parent ffff8880881adb48 [ 420.051159] kobject: 'tx-0' (ffff888097c747d8): auto cleanup 'remove' event [ 420.051163] kobject: 'tx-0' (ffff888097c747d8): kobject_uevent_env [ 420.051167] kobject: 'tx-0' (ffff888097c747d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.051170] kobject: 'tx-0' (ffff888097c747d8): auto cleanup kobject_del [ 420.051188] kobject: 'tx-0' (ffff888097c747d8): calling ktype release [ 420.051191] kobject: 'tx-0': free name [ 420.051202] kobject: 'queues' (ffff8880881adb48): kobject_cleanup, parent (null) [ 420.051205] kobject: 'queues' (ffff8880881adb48): calling ktype release [ 420.051209] kobject: 'queues' (ffff8880881adb48): kset_release [ 420.051216] kobject: 'queues': free name [ 420.051411] kobject: 'ip6_vti0' (ffff88804f1250f0): kobject_uevent_env [ 420.051415] kobject: 'ip6_vti0' (ffff88804f1250f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.052823] kobject: 'loop4' (ffff8880a4a62aa0): kobject_uevent_env [ 420.052845] kobject: 'loop4' (ffff8880a4a62aa0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 420.062198] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 420.062224] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 420.100583] kobject: 'ip6_vti0' (ffff88804f1250f0): kobject_cleanup, parent (null) [ 420.100588] kobject: 'ip6_vti0' (ffff88804f1250f0): calling ktype release [ 420.100602] kobject: 'ip6_vti0': free name [ 420.101278] kobject: 'rx-0' (ffff88809bc16550): kobject_cleanup, parent ffff888086eb1a48 [ 420.101282] kobject: 'rx-0' (ffff88809bc16550): auto cleanup 'remove' event [ 420.101286] kobject: 'rx-0' (ffff88809bc16550): kobject_uevent_env [ 420.101290] kobject: 'rx-0' (ffff88809bc16550): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.101293] kobject: 'rx-0' (ffff88809bc16550): auto cleanup kobject_del [ 420.101313] kobject: 'rx-0' (ffff88809bc16550): calling ktype release [ 420.101316] kobject: 'rx-0': free name [ 420.101341] kobject: 'tx-0' (ffff8880a90c77d8): kobject_cleanup, parent ffff888086eb1a48 [ 420.101345] kobject: 'tx-0' (ffff8880a90c77d8): auto cleanup 'remove' event [ 420.101348] kobject: 'tx-0' (ffff8880a90c77d8): kobject_uevent_env [ 420.101352] kobject: 'tx-0' (ffff8880a90c77d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.101356] kobject: 'tx-0' (ffff8880a90c77d8): auto cleanup kobject_del [ 420.101372] kobject: 'tx-0' (ffff8880a90c77d8): calling ktype release [ 420.101375] kobject: 'tx-0': free name [ 420.101386] kobject: 'queues' (ffff888086eb1a48): kobject_cleanup, parent (null) [ 420.101389] kobject: 'queues' (ffff888086eb1a48): calling ktype release [ 420.101393] kobject: 'queues' (ffff888086eb1a48): kset_release [ 420.101398] kobject: 'queues': free name [ 420.101619] kobject: 'ip_vti0' (ffff8880592beeb0): kobject_uevent_env [ 420.101624] kobject: 'ip_vti0' (ffff8880592beeb0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.109540] kobject: 'loop3' (ffff8880a4a081a0): kobject_uevent_env [ 420.109564] kobject: 'loop3' (ffff8880a4a081a0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 420.150497] kobject: 'ip_vti0' (ffff8880592beeb0): kobject_cleanup, parent (null) [ 420.150502] kobject: 'ip_vti0' (ffff8880592beeb0): calling ktype release [ 420.150520] kobject: 'ip_vti0': free name [ 420.151045] kobject: 'batman_adv' (ffff88808cf23900): kobject_uevent_env [ 420.151050] kobject: 'batman_adv' (ffff88808cf23900): kobject_uevent_env: filter function caused the event to drop! [ 420.151071] kobject: 'batman_adv' (ffff88808cf23900): kobject_cleanup, parent (null) [ 420.151074] kobject: 'batman_adv' (ffff88808cf23900): calling ktype release [ 420.151078] kobject: (ffff88808cf23900): dynamic_kobj_release [ 420.151084] kobject: 'batman_adv': free name [ 420.151185] kobject: 'rx-0' (ffff88809777b3d0): kobject_cleanup, parent ffff888097e0ee48 [ 420.151189] kobject: 'rx-0' (ffff88809777b3d0): auto cleanup 'remove' event [ 420.151192] kobject: 'rx-0' (ffff88809777b3d0): kobject_uevent_env [ 420.151195] kobject: 'rx-0' (ffff88809777b3d0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.151197] kobject: 'rx-0' (ffff88809777b3d0): auto cleanup kobject_del [ 420.151212] kobject: 'rx-0' (ffff88809777b3d0): calling ktype release [ 420.151215] kobject: 'rx-0': free name [ 420.151238] kobject: 'tx-0' (ffff88805d6efad8): kobject_cleanup, parent ffff888097e0ee48 [ 420.151241] kobject: 'tx-0' (ffff88805d6efad8): auto cleanup 'remove' event [ 420.151244] kobject: 'tx-0' (ffff88805d6efad8): kobject_uevent_env [ 420.151247] kobject: 'tx-0' (ffff88805d6efad8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.151250] kobject: 'tx-0' (ffff88805d6efad8): auto cleanup kobject_del [ 420.151274] kobject: 'tx-0' (ffff88805d6efad8): calling ktype release [ 420.151276] kobject: 'tx-0': free name [ 420.151286] kobject: 'queues' (ffff888097e0ee48): kobject_cleanup, parent (null) [ 420.151289] kobject: 'queues' (ffff888097e0ee48): calling ktype release [ 420.151292] kobject: 'queues' (ffff888097e0ee48): kset_release [ 420.151297] kobject: 'queues': free name [ 420.151487] kobject: 'erspan0' (ffff8880485e4cb0): kobject_uevent_env [ 420.151491] kobject: 'erspan0' (ffff8880485e4cb0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.190300] kobject: 'erspan0' (ffff8880485e4cb0): kobject_cleanup, parent (null) [ 420.190305] kobject: 'erspan0' (ffff8880485e4cb0): calling ktype release [ 420.190321] kobject: 'erspan0': free name [ 420.190811] kobject: 'batman_adv' (ffff88809b953580): kobject_uevent_env [ 420.190815] kobject: 'batman_adv' (ffff88809b953580): kobject_uevent_env: filter function caused the event to drop! [ 420.190835] kobject: 'batman_adv' (ffff88809b953580): kobject_cleanup, parent (null) [ 420.190838] kobject: 'batman_adv' (ffff88809b953580): calling ktype release [ 420.190842] kobject: (ffff88809b953580): dynamic_kobj_release [ 420.190847] kobject: 'batman_adv': free name [ 420.190948] kobject: 'rx-0' (ffff88809777be50): kobject_cleanup, parent ffff88809e956348 [ 420.190952] kobject: 'rx-0' (ffff88809777be50): auto cleanup 'remove' event [ 420.190955] kobject: 'rx-0' (ffff88809777be50): kobject_uevent_env [ 420.190959] kobject: 'rx-0' (ffff88809777be50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.190962] kobject: 'rx-0' (ffff88809777be50): auto cleanup kobject_del [ 420.190976] kobject: 'rx-0' (ffff88809777be50): calling ktype release [ 420.190978] kobject: 'rx-0': free name [ 420.191003] kobject: 'tx-0' (ffff888093856c98): kobject_cleanup, parent ffff88809e956348 [ 420.191007] kobject: 'tx-0' (ffff888093856c98): auto cleanup 'remove' event [ 420.191010] kobject: 'tx-0' (ffff888093856c98): kobject_uevent_env [ 420.191013] kobject: 'tx-0' (ffff888093856c98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.191016] kobject: 'tx-0' (ffff888093856c98): auto cleanup kobject_del [ 420.191033] kobject: 'tx-0' (ffff888093856c98): calling ktype release [ 420.191035] kobject: 'tx-0': free name [ 420.191046] kobject: 'queues' (ffff88809e956348): kobject_cleanup, parent (null) [ 420.191049] kobject: 'queues' (ffff88809e956348): calling ktype release [ 420.191052] kobject: 'queues' (ffff88809e956348): kset_release [ 420.191057] kobject: 'queues': free name [ 420.191245] kobject: 'gretap0' (ffff88805934aab0): kobject_uevent_env [ 420.191248] kobject: 'gretap0' (ffff88805934aab0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.230597] kobject: 'gretap0' (ffff88805934aab0): kobject_cleanup, parent (null) [ 420.230602] kobject: 'gretap0' (ffff88805934aab0): calling ktype release [ 420.230615] kobject: 'gretap0': free name [ 420.231007] kobject: 'rx-0' (ffff888096f74310): kobject_cleanup, parent ffff888083cd0e48 [ 420.231010] kobject: 'rx-0' (ffff888096f74310): auto cleanup 'remove' event [ 420.231014] kobject: 'rx-0' (ffff888096f74310): kobject_uevent_env [ 420.231018] kobject: 'rx-0' (ffff888096f74310): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.231021] kobject: 'rx-0' (ffff888096f74310): auto cleanup kobject_del [ 420.231039] kobject: 'rx-0' (ffff888096f74310): calling ktype release [ 420.231041] kobject: 'rx-0': free name [ 420.231064] kobject: 'tx-0' (ffff8880972b3d58): kobject_cleanup, parent ffff888083cd0e48 [ 420.231067] kobject: 'tx-0' (ffff8880972b3d58): auto cleanup 'remove' event [ 420.231070] kobject: 'tx-0' (ffff8880972b3d58): kobject_uevent_env [ 420.231073] kobject: 'tx-0' (ffff8880972b3d58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.231076] kobject: 'tx-0' (ffff8880972b3d58): auto cleanup kobject_del [ 420.231090] kobject: 'tx-0' (ffff8880972b3d58): calling ktype release [ 420.231092] kobject: 'tx-0': free name [ 420.231102] kobject: 'queues' (ffff888083cd0e48): kobject_cleanup, parent (null) [ 420.231105] kobject: 'queues' (ffff888083cd0e48): calling ktype release [ 420.231109] kobject: 'queues' (ffff888083cd0e48): kset_release [ 420.231114] kobject: 'queues': free name [ 420.231310] kobject: 'gre0' (ffff888083eb0970): kobject_uevent_env [ 420.231314] kobject: 'gre0' (ffff888083eb0970): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.270271] kobject: 'gre0' (ffff888083eb0970): kobject_cleanup, parent (null) [ 420.270276] kobject: 'gre0' (ffff888083eb0970): calling ktype release [ 420.270288] kobject: 'gre0': free name [ 420.270668] kobject: 'rx-0' (ffff8880a0d0e850): kobject_cleanup, parent ffff88809f87ab48 [ 420.270672] kobject: 'rx-0' (ffff8880a0d0e850): auto cleanup 'remove' event [ 420.270676] kobject: 'rx-0' (ffff8880a0d0e850): kobject_uevent_env [ 420.270679] kobject: 'rx-0' (ffff8880a0d0e850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.270683] kobject: 'rx-0' (ffff8880a0d0e850): auto cleanup kobject_del [ 420.270708] kobject: 'rx-0' (ffff8880a0d0e850): calling ktype release [ 420.270728] kobject: 'rx-0': free name [ 420.270753] kobject: 'tx-0' (ffff88809c53b358): kobject_cleanup, parent ffff88809f87ab48 [ 420.270756] kobject: 'tx-0' (ffff88809c53b358): auto cleanup 'remove' event [ 420.270759] kobject: 'tx-0' (ffff88809c53b358): kobject_uevent_env [ 420.270763] kobject: 'tx-0' (ffff88809c53b358): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.270765] kobject: 'tx-0' (ffff88809c53b358): auto cleanup kobject_del [ 420.270782] kobject: 'tx-0' (ffff88809c53b358): calling ktype release [ 420.270784] kobject: 'tx-0': free name [ 420.270794] kobject: 'queues' (ffff88809f87ab48): kobject_cleanup, parent (null) [ 420.270797] kobject: 'queues' (ffff88809f87ab48): calling ktype release [ 420.270801] kobject: 'queues' (ffff88809f87ab48): kset_release [ 420.270807] kobject: 'queues': free name [ 420.271000] kobject: 'tunl0' (ffff88809006e830): kobject_uevent_env [ 420.271004] kobject: 'tunl0' (ffff88809006e830): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.293452] kobject: 'loop1' (ffff8880a49700a0): kobject_uevent_env [ 420.293471] kobject: 'loop1' (ffff8880a49700a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 420.320556] kobject: 'tunl0' (ffff88809006e830): kobject_cleanup, parent (null) [ 420.320561] kobject: 'tunl0' (ffff88809006e830): calling ktype release [ 420.320574] kobject: 'tunl0': free name [ 420.361687] kobject: 'rx-0' (ffff8880a3cd6850): kobject_cleanup, parent ffff8880a0952148 [ 420.361691] kobject: 'rx-0' (ffff8880a3cd6850): auto cleanup 'remove' event [ 420.361695] kobject: 'rx-0' (ffff8880a3cd6850): kobject_uevent_env [ 420.361699] kobject: 'rx-0' (ffff8880a3cd6850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.361702] kobject: 'rx-0' (ffff8880a3cd6850): auto cleanup kobject_del [ 420.361721] kobject: 'rx-0' (ffff8880a3cd6850): calling ktype release [ 420.361724] kobject: 'rx-0': free name [ 420.361748] kobject: 'tx-0' (ffff88809657e298): kobject_cleanup, parent ffff8880a0952148 [ 420.361752] kobject: 'tx-0' (ffff88809657e298): auto cleanup 'remove' event [ 420.361755] kobject: 'tx-0' (ffff88809657e298): kobject_uevent_env [ 420.361758] kobject: 'tx-0' (ffff88809657e298): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.361761] kobject: 'tx-0' (ffff88809657e298): auto cleanup kobject_del [ 420.361777] kobject: 'tx-0' (ffff88809657e298): calling ktype release [ 420.361779] kobject: 'tx-0': free name [ 420.361790] kobject: 'queues' (ffff8880a0952148): kobject_cleanup, parent (null) [ 420.361793] kobject: 'queues' (ffff8880a0952148): calling ktype release [ 420.361797] kobject: 'queues' (ffff8880a0952148): kset_release [ 420.361802] kobject: 'queues': free name [ 420.361999] kobject: 'lo' (ffff888098e0f3b0): kobject_uevent_env [ 420.362003] kobject: 'lo' (ffff888098e0f3b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.403861] kobject: 'lo' (ffff888098e0f3b0): kobject_cleanup, parent (null) [ 420.403865] kobject: 'lo' (ffff888098e0f3b0): calling ktype release [ 420.403877] kobject: 'lo': free name [ 420.577978] kobject: 'loop0' (ffff8880a49246a0): kobject_uevent_env [ 420.577999] kobject: 'loop0' (ffff8880a49246a0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 421.455030] kobject: 'rx-0' (ffff888085b70d90): kobject_cleanup, parent ffff88808a72ce48 [ 421.475104] kobject: 'loop2' (ffff8880a491c120): kobject_uevent_env [ 421.480315] kobject: 'rx-0' (ffff888085b70d90): auto cleanup 'remove' event [ 421.488427] kobject: 'loop2' (ffff8880a491c120): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 421.492927] kobject: 'rx-0' (ffff888085b70d90): kobject_uevent_env [ 421.492931] kobject: 'rx-0' (ffff888085b70d90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.492934] kobject: 'rx-0' (ffff888085b70d90): auto cleanup kobject_del [ 421.492957] kobject: 'rx-0' (ffff888085b70d90): calling ktype release [ 421.492960] kobject: 'rx-0': free name [ 422.309088] kobject: 'tx-0' (ffff8880a9715058): kobject_cleanup, parent ffff88808a72ce48 [ 422.309366] net_ratelimit: 22 callbacks suppressed [ 422.309370] protocol 88fb is buggy, dev hsr_slave_0 [ 422.318470] kobject: 'tx-0' (ffff8880a9715058): auto cleanup 'remove' event [ 422.322284] protocol 88fb is buggy, dev hsr_slave_1 [ 422.339469] kobject: 'tx-0' (ffff8880a9715058): kobject_uevent_env [ 422.345825] kobject: 'tx-0' (ffff8880a9715058): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.356142] kobject: 'tx-0' (ffff8880a9715058): auto cleanup kobject_del [ 422.363023] kobject: 'tx-0' (ffff8880a9715058): calling ktype release [ 422.369600] kobject: 'tx-0': free name [ 422.373789] kobject: 'queues' (ffff88808a72ce48): kobject_cleanup, parent (null) [ 422.382252] kobject: 'queues' (ffff88808a72ce48): calling ktype release [ 422.388998] kobject: 'queues' (ffff88808a72ce48): kset_release [ 422.394990] kobject: 'queues': free name [ 422.399224] kobject: 'ip6gre0' (ffff88809e4e3030): kobject_uevent_env [ 422.405826] kobject: 'ip6gre0' (ffff88809e4e3030): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.416687] kobject: 'batman_adv' (ffff88808ca83280): kobject_uevent_env [ 422.423647] kobject: 'batman_adv' (ffff88808ca83280): kobject_uevent_env: filter function caused the event to drop! [ 422.434254] kobject: 'batman_adv' (ffff88808ca83280): kobject_cleanup, parent (null) [ 422.444699] kobject: 'batman_adv' (ffff88808ca83280): calling ktype release [ 422.451925] kobject: (ffff88808ca83280): dynamic_kobj_release [ 422.457798] kobject: 'batman_adv': free name [ 422.462329] kobject: 'rx-0' (ffff888094667550): kobject_cleanup, parent ffff888090630f48 [ 422.470579] kobject: 'rx-0' (ffff888094667550): auto cleanup 'remove' event [ 422.477660] kobject: 'rx-0' (ffff888094667550): kobject_uevent_env [ 422.483982] kobject: 'rx-0' (ffff888094667550): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.494152] kobject: 'rx-0' (ffff888094667550): auto cleanup kobject_del [ 422.501093] kobject: 'rx-0' (ffff888094667550): calling ktype release [ 422.507655] kobject: 'rx-0': free name [ 422.511590] kobject: 'tx-0' (ffff8880a018a358): kobject_cleanup, parent ffff888090630f48 [ 422.519804] kobject: 'tx-0' (ffff8880a018a358): auto cleanup 'remove' event [ 422.526946] kobject: 'tx-0' (ffff8880a018a358): kobject_uevent_env [ 422.533268] kobject: 'tx-0' (ffff8880a018a358): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.543342] kobject: 'tx-0' (ffff8880a018a358): auto cleanup kobject_del [ 422.550308] kobject: 'tx-0' (ffff8880a018a358): calling ktype release [ 422.556966] kobject: 'tx-0': free name [ 422.560886] kobject: 'queues' (ffff888090630f48): kobject_cleanup, parent (null) [ 422.569271] kobject: 'queues' (ffff888090630f48): calling ktype release [ 422.576228] kobject: 'queues' (ffff888090630f48): kset_release [ 422.582314] kobject: 'queues': free name [ 422.586492] kobject: 'ip6gretap0' (ffff8880a815e670): kobject_uevent_env [ 422.593349] kobject: 'ip6gretap0' (ffff8880a815e670): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.640255] kobject: 'ip6gre0' (ffff88809e4e3030): kobject_cleanup, parent (null) [ 422.648764] kobject: 'ip6gre0' (ffff88809e4e3030): calling ktype release [ 422.655673] kobject: 'ip6gre0': free name [ 422.659912] kobject: 'ip6gretap0' (ffff8880a815e670): kobject_cleanup, parent (null) [ 422.668811] kobject: 'ip6gretap0' (ffff8880a815e670): calling ktype release [ 422.675997] kobject: 'ip6gretap0': free name [ 422.681128] kobject: 'rx-0' (ffff888090142550): kobject_cleanup, parent ffff88809fc19748 [ 422.689357] kobject: 'rx-0' (ffff888090142550): auto cleanup 'remove' event [ 422.696488] kobject: 'rx-0' (ffff888090142550): kobject_uevent_env [ 422.702945] kobject: 'rx-0' (ffff888090142550): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.713027] kobject: 'rx-0' (ffff888090142550): auto cleanup kobject_del [ 422.719868] kobject: 'rx-0' (ffff888090142550): calling ktype release [ 422.726605] kobject: 'rx-0': free name [ 422.730539] kobject: 'tx-0' (ffff88808558c0d8): kobject_cleanup, parent ffff88809fc19748 [ 422.738764] kobject: 'tx-0' (ffff88808558c0d8): auto cleanup 'remove' event [ 422.745876] kobject: 'tx-0' (ffff88808558c0d8): kobject_uevent_env [ 422.752219] kobject: 'tx-0' (ffff88808558c0d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.762276] kobject: 'tx-0' (ffff88808558c0d8): auto cleanup kobject_del [ 422.769117] kobject: 'tx-0' (ffff88808558c0d8): calling ktype release [ 422.775713] kobject: 'tx-0': free name [ 422.779594] kobject: 'queues' (ffff88809fc19748): kobject_cleanup, parent (null) [ 422.788016] kobject: 'queues' (ffff88809fc19748): calling ktype release [ 422.794785] kobject: 'queues' (ffff88809fc19748): kset_release [ 422.800794] kobject: 'queues': free name [ 422.804995] kobject: 'ip6gre0' (ffff8880a1f5e6b0): kobject_uevent_env [ 422.810103] protocol 88fb is buggy, dev hsr_slave_0 [ 422.811609] kobject: 'ip6gre0' (ffff8880a1f5e6b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.816614] protocol 88fb is buggy, dev hsr_slave_1 [ 422.850235] kobject: 'ip6gre0' (ffff8880a1f5e6b0): kobject_cleanup, parent (null) [ 422.858758] kobject: 'ip6gre0' (ffff8880a1f5e6b0): calling ktype release [ 422.865664] kobject: 'ip6gre0': free name [ 422.871378] kobject: 'rx-0' (ffff88809ee45b50): kobject_cleanup, parent ffff88809edc0c48 [ 422.879616] kobject: 'rx-0' (ffff88809ee45b50): auto cleanup 'remove' event [ 422.887230] kobject: 'rx-0' (ffff88809ee45b50): kobject_uevent_env [ 422.893583] kobject: 'rx-0' (ffff88809ee45b50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.903648] kobject: 'rx-0' (ffff88809ee45b50): auto cleanup kobject_del [ 422.910869] kobject: 'rx-0' (ffff88809ee45b50): calling ktype release [ 422.917457] kobject: 'rx-0': free name [ 422.921378] kobject: 'tx-0' (ffff88809c340cd8): kobject_cleanup, parent ffff88809edc0c48 [ 422.929589] kobject: 'tx-0' (ffff88809c340cd8): auto cleanup 'remove' event [ 422.936708] kobject: 'tx-0' (ffff88809c340cd8): kobject_uevent_env [ 422.943037] kobject: 'tx-0' (ffff88809c340cd8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.953095] kobject: 'tx-0' (ffff88809c340cd8): auto cleanup kobject_del [ 422.959953] kobject: 'tx-0' (ffff88809c340cd8): calling ktype release [ 422.966556] kobject: 'tx-0': free name [ 422.970461] kobject: 'queues' (ffff88809edc0c48): kobject_cleanup, parent (null) [ 422.978864] kobject: 'queues' (ffff88809edc0c48): calling ktype release [ 422.985622] kobject: 'queues' (ffff88809edc0c48): kset_release [ 422.991595] kobject: 'queues': free name [ 422.995791] kobject: 'ip6tnl0' (ffff888083feee30): kobject_uevent_env [ 423.002398] kobject: 'ip6tnl0' (ffff888083feee30): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.030238] kobject: 'ip6tnl0' (ffff888083feee30): kobject_cleanup, parent (null) [ 423.038778] kobject: 'ip6tnl0' (ffff888083feee30): calling ktype release [ 423.045749] kobject: 'ip6tnl0': free name [ 423.050466] kobject: 'rx-0' (ffff8880a13fe550): kobject_cleanup, parent ffff88809929fb48 [ 423.058715] kobject: 'rx-0' (ffff8880a13fe550): auto cleanup 'remove' event [ 423.065828] kobject: 'rx-0' (ffff8880a13fe550): kobject_uevent_env [ 423.072176] kobject: 'rx-0' (ffff8880a13fe550): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.082231] kobject: 'rx-0' (ffff8880a13fe550): auto cleanup kobject_del [ 423.089097] kobject: 'rx-0' (ffff8880a13fe550): calling ktype release [ 423.095819] kobject: 'rx-0': free name [ 423.099764] kobject: 'tx-0' (ffff88808c0da7d8): kobject_cleanup, parent ffff88809929fb48 [ 423.108002] kobject: 'tx-0' (ffff88808c0da7d8): auto cleanup 'remove' event [ 423.115101] kobject: 'tx-0' (ffff88808c0da7d8): kobject_uevent_env [ 423.121457] kobject: 'tx-0' (ffff88808c0da7d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.131559] kobject: 'tx-0' (ffff88808c0da7d8): auto cleanup kobject_del [ 423.138395] kobject: 'tx-0' (ffff88808c0da7d8): calling ktype release [ 423.144971] kobject: 'tx-0': free name [ 423.148874] kobject: 'queues' (ffff88809929fb48): kobject_cleanup, parent (null) [ 423.157275] kobject: 'queues' (ffff88809929fb48): calling ktype release [ 423.164038] kobject: 'queues' (ffff88809929fb48): kset_release [ 423.169987] kobject: 'queues': free name [ 423.174324] kobject: 'ip6tnl0' (ffff888055dae5f0): kobject_uevent_env [ 423.180922] kobject: 'ip6tnl0' (ffff888055dae5f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.210199] kobject: 'ip6tnl0' (ffff888055dae5f0): kobject_cleanup, parent (null) [ 423.218702] kobject: 'ip6tnl0' (ffff888055dae5f0): calling ktype release [ 423.225574] kobject: 'ip6tnl0': free name [ 423.231566] kobject: 'rx-0' (ffff888085b70850): kobject_cleanup, parent ffff88809edc0848 [ 423.239795] kobject: 'rx-0' (ffff888085b70850): auto cleanup 'remove' event [ 423.246911] kobject: 'rx-0' (ffff888085b70850): kobject_uevent_env [ 423.253248] kobject: 'rx-0' (ffff888085b70850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.263301] kobject: 'rx-0' (ffff888085b70850): auto cleanup kobject_del [ 423.270564] kobject: 'rx-0' (ffff888085b70850): calling ktype release [ 423.277139] kobject: 'rx-0': free name [ 423.280092] protocol 88fb is buggy, dev hsr_slave_0 [ 423.281059] kobject: 'tx-0' (ffff8880a953ead8): kobject_cleanup, parent ffff88809edc0848 [ 423.286055] protocol 88fb is buggy, dev hsr_slave_1 [ 423.294258] kobject: 'tx-0' (ffff8880a953ead8): auto cleanup 'remove' event [ 423.306367] kobject: 'tx-0' (ffff8880a953ead8): kobject_uevent_env [ 423.312692] kobject: 'tx-0' (ffff8880a953ead8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.322760] kobject: 'tx-0' (ffff8880a953ead8): auto cleanup kobject_del [ 423.329601] kobject: 'tx-0' (ffff8880a953ead8): calling ktype release [ 423.336185] kobject: 'tx-0': free name [ 423.340090] kobject: 'queues' (ffff88809edc0848): kobject_cleanup, parent (null) [ 423.348515] kobject: 'queues' (ffff88809edc0848): calling ktype release [ 423.355279] kobject: 'queues' (ffff88809edc0848): kset_release [ 423.361264] kobject: 'queues': free name [ 423.365464] kobject: 'sit0' (ffff888054576c30): kobject_uevent_env [ 423.371904] kobject: 'sit0' (ffff888054576c30): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.400246] kobject: 'sit0' (ffff888054576c30): kobject_cleanup, parent (null) [ 423.408548] kobject: 'sit0' (ffff888054576c30): calling ktype release [ 423.415204] kobject: 'sit0': free name [ 423.419585] kobject: 'rx-0' (ffff88808f58e9d0): kobject_cleanup, parent ffff88807f4ffd48 [ 423.427882] kobject: 'rx-0' (ffff88808f58e9d0): auto cleanup 'remove' event [ 423.435005] kobject: 'rx-0' (ffff88808f58e9d0): kobject_uevent_env [ 423.441387] protocol 88fb is buggy, dev hsr_slave_0 [ 423.441425] protocol 88fb is buggy, dev hsr_slave_1 [ 423.451508] kobject: 'rx-0' (ffff88808f58e9d0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.461697] kobject: 'rx-0' (ffff88808f58e9d0): auto cleanup kobject_del [ 423.468543] kobject: 'rx-0' (ffff88808f58e9d0): calling ktype release [ 423.475147] kobject: 'rx-0': free name [ 423.479063] kobject: 'tx-0' (ffff88809655b5d8): kobject_cleanup, parent ffff88807f4ffd48 [ 423.487301] kobject: 'tx-0' (ffff88809655b5d8): auto cleanup 'remove' event [ 423.494423] kobject: 'tx-0' (ffff88809655b5d8): kobject_uevent_env [ 423.500954] kobject: 'tx-0' (ffff88809655b5d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.511015] kobject: 'tx-0' (ffff88809655b5d8): auto cleanup kobject_del [ 423.517849] kobject: 'tx-0' (ffff88809655b5d8): calling ktype release [ 423.520286] protocol 88fb is buggy, dev hsr_slave_0 [ 423.524832] kobject: 'tx-0': free name [ 423.529458] protocol 88fb is buggy, dev hsr_slave_1 [ 423.533353] kobject: 'queues' (ffff88807f4ffd48): kobject_cleanup, parent (null) [ 423.546732] kobject: 'queues' (ffff88807f4ffd48): calling ktype release [ 423.553488] kobject: 'queues' (ffff88807f4ffd48): kset_release [ 423.559470] kobject: 'queues': free name [ 423.563762] kobject: 'sit0' (ffff88805be392f0): kobject_uevent_env [ 423.570112] kobject: 'sit0' (ffff88805be392f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.600215] kobject: 'sit0' (ffff88805be392f0): kobject_cleanup, parent (null) [ 423.608475] kobject: 'sit0' (ffff88805be392f0): calling ktype release [ 423.615183] kobject: 'sit0': free name [ 423.620280] kobject: 'rx-0' (ffff88809c5c1c10): kobject_cleanup, parent ffff88805cb85748 [ 423.628514] kobject: 'rx-0' (ffff88809c5c1c10): auto cleanup 'remove' event [ 423.635622] kobject: 'rx-0' (ffff88809c5c1c10): kobject_uevent_env [ 423.641956] kobject: 'rx-0' (ffff88809c5c1c10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.652027] kobject: 'rx-0' (ffff88809c5c1c10): auto cleanup kobject_del [ 423.658868] kobject: 'rx-0' (ffff88809c5c1c10): calling ktype release [ 423.665693] kobject: 'rx-0': free name [ 423.669590] kobject: 'tx-0' (ffff88809f897a58): kobject_cleanup, parent ffff88805cb85748 [ 423.677833] kobject: 'tx-0' (ffff88809f897a58): auto cleanup 'remove' event [ 423.684954] kobject: 'tx-0' (ffff88809f897a58): kobject_uevent_env [ 423.691275] kobject: 'tx-0' (ffff88809f897a58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.701329] kobject: 'tx-0' (ffff88809f897a58): auto cleanup kobject_del [ 423.708171] kobject: 'tx-0' (ffff88809f897a58): calling ktype release [ 423.714749] kobject: 'tx-0': free name [ 423.718639] kobject: 'queues' (ffff88805cb85748): kobject_cleanup, parent (null) [ 423.727045] kobject: 'queues' (ffff88805cb85748): calling ktype release [ 423.733797] kobject: 'queues' (ffff88805cb85748): kset_release [ 423.739749] kobject: 'queues': free name [ 423.744064] kobject: 'ip6_vti0' (ffff888055212a30): kobject_uevent_env [ 423.750776] kobject: 'ip6_vti0' (ffff888055212a30): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.800233] kobject: 'ip6_vti0' (ffff888055212a30): kobject_cleanup, parent (null) [ 423.808972] kobject: 'ip6_vti0' (ffff888055212a30): calling ktype release [ 423.815945] kobject: 'ip6_vti0': free name [ 423.821544] kobject: 'rx-0' (ffff88809ba85610): kobject_cleanup, parent ffff88805a58f048 [ 423.829774] kobject: 'rx-0' (ffff88809ba85610): auto cleanup 'remove' event [ 423.836916] kobject: 'rx-0' (ffff88809ba85610): kobject_uevent_env [ 423.843250] kobject: 'rx-0' (ffff88809ba85610): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.853318] kobject: 'rx-0' (ffff88809ba85610): auto cleanup kobject_del [ 423.860313] kobject: 'rx-0' (ffff88809ba85610): calling ktype release [ 423.866878] kobject: 'rx-0': free name [ 423.870805] kobject: 'tx-0' (ffff88809fe230d8): kobject_cleanup, parent ffff88805a58f048 [ 423.879104] kobject: 'tx-0' (ffff88809fe230d8): auto cleanup 'remove' event [ 423.886239] kobject: 'tx-0' (ffff88809fe230d8): kobject_uevent_env [ 423.892562] kobject: 'tx-0' (ffff88809fe230d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.907340] kobject: 'tx-0' (ffff88809fe230d8): auto cleanup kobject_del [ 423.914233] kobject: 'tx-0' (ffff88809fe230d8): calling ktype release [ 423.920848] kobject: 'tx-0': free name [ 423.924732] kobject: 'queues' (ffff88805a58f048): kobject_cleanup, parent (null) [ 423.933161] kobject: 'queues' (ffff88805a58f048): calling ktype release [ 423.939901] kobject: 'queues' (ffff88805a58f048): kset_release [ 423.945888] kobject: 'queues': free name [ 423.950126] kobject: 'ip6_vti0' (ffff88805d8df0f0): kobject_uevent_env [ 423.956774] kobject: 'ip6_vti0' (ffff88805d8df0f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.990209] kobject: 'ip6_vti0' (ffff88805d8df0f0): kobject_cleanup, parent (null) [ 423.998910] kobject: 'ip6_vti0' (ffff88805d8df0f0): calling ktype release [ 424.006870] kobject: 'ip6_vti0': free name [ 424.012463] kobject: 'rx-0' (ffff8880867df910): kobject_cleanup, parent ffff88805cb85e48 [ 424.020740] kobject: 'rx-0' (ffff8880867df910): auto cleanup 'remove' event [ 424.027841] kobject: 'rx-0' (ffff8880867df910): kobject_uevent_env [ 424.034179] kobject: 'rx-0' (ffff8880867df910): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.044262] kobject: 'rx-0' (ffff8880867df910): auto cleanup kobject_del [ 424.051383] kobject: 'rx-0' (ffff8880867df910): calling ktype release [ 424.057971] kobject: 'rx-0': free name [ 424.061898] kobject: 'tx-0' (ffff88808ee83558): kobject_cleanup, parent ffff88805cb85e48 [ 424.070124] kobject: 'tx-0' (ffff88808ee83558): auto cleanup 'remove' event [ 424.077203] kobject: 'tx-0' (ffff88808ee83558): kobject_uevent_env [ 424.083591] kobject: 'tx-0' (ffff88808ee83558): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.093983] kobject: 'tx-0' (ffff88808ee83558): auto cleanup kobject_del [ 424.101021] kobject: 'tx-0' (ffff88808ee83558): calling ktype release [ 424.107607] kobject: 'tx-0': free name [ 424.111532] kobject: 'queues' (ffff88805cb85e48): kobject_cleanup, parent (null) [ 424.119934] kobject: 'queues' (ffff88805cb85e48): calling ktype release [ 424.126707] kobject: 'queues' (ffff88805cb85e48): kset_release [ 424.132691] kobject: 'queues': free name [ 424.136884] kobject: 'ip_vti0' (ffff88808b7227f0): kobject_uevent_env [ 424.143506] kobject: 'ip_vti0' (ffff88808b7227f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.200269] kobject: 'ip_vti0' (ffff88808b7227f0): kobject_cleanup, parent (null) [ 424.208836] kobject: 'ip_vti0' (ffff88808b7227f0): calling ktype release [ 424.215713] kobject: 'ip_vti0': free name [ 424.220488] kobject: 'rx-0' (ffff888085b70550): kobject_cleanup, parent ffff88805a58f348 [ 424.228760] kobject: 'rx-0' (ffff888085b70550): auto cleanup 'remove' event [ 424.235875] kobject: 'rx-0' (ffff888085b70550): kobject_uevent_env [ 424.242210] kobject: 'rx-0' (ffff888085b70550): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.252270] kobject: 'rx-0' (ffff888085b70550): auto cleanup kobject_del [ 424.259115] kobject: 'rx-0' (ffff888085b70550): calling ktype release [ 424.265830] kobject: 'rx-0': free name [ 424.269733] kobject: 'tx-0' (ffff888083dc1818): kobject_cleanup, parent ffff88805a58f348 [ 424.277971] kobject: 'tx-0' (ffff888083dc1818): auto cleanup 'remove' event [ 424.285083] kobject: 'tx-0' (ffff888083dc1818): kobject_uevent_env [ 424.291403] kobject: 'tx-0' (ffff888083dc1818): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.301490] kobject: 'tx-0' (ffff888083dc1818): auto cleanup kobject_del [ 424.308345] kobject: 'tx-0' (ffff888083dc1818): calling ktype release [ 424.314925] kobject: 'tx-0': free name [ 424.318810] kobject: 'queues' (ffff88805a58f348): kobject_cleanup, parent (null) [ 424.327226] kobject: 'queues' (ffff88805a58f348): calling ktype release [ 424.333979] kobject: 'queues' (ffff88805a58f348): kset_release [ 424.339927] kobject: 'queues': free name [ 424.344191] kobject: 'ip_vti0' (ffff88805cd0ceb0): kobject_uevent_env [ 424.350803] kobject: 'ip_vti0' (ffff88805cd0ceb0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.380238] kobject: 'ip_vti0' (ffff88805cd0ceb0): kobject_cleanup, parent (null) [ 424.396761] kobject: 'ip_vti0' (ffff88805cd0ceb0): calling ktype release [ 424.403798] kobject: 'ip_vti0': free name [ 424.409154] kobject: 'batman_adv' (ffff8880a6856f00): kobject_uevent_env [ 424.416121] kobject: 'batman_adv' (ffff8880a6856f00): kobject_uevent_env: filter function caused the event to drop! [ 424.426748] kobject: 'batman_adv' (ffff8880a6856f00): kobject_cleanup, parent (null) [ 424.437192] kobject: 'batman_adv' (ffff8880a6856f00): calling ktype release [ 424.444557] kobject: (ffff8880a6856f00): dynamic_kobj_release [ 424.450454] kobject: 'batman_adv': free name [ 424.454942] kobject: 'rx-0' (ffff888085721d90): kobject_cleanup, parent ffff88809fc4c348 [ 424.463180] kobject: 'rx-0' (ffff888085721d90): auto cleanup 'remove' event [ 424.470281] kobject: 'rx-0' (ffff888085721d90): kobject_uevent_env [ 424.476583] kobject: 'rx-0' (ffff888085721d90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.486673] kobject: 'rx-0' (ffff888085721d90): auto cleanup kobject_del [ 424.493557] kobject: 'rx-0' (ffff888085721d90): calling ktype release [ 424.500166] kobject: 'rx-0': free name [ 424.504101] kobject: 'tx-0' (ffff888080849c98): kobject_cleanup, parent ffff88809fc4c348 [ 424.512383] kobject: 'tx-0' (ffff888080849c98): auto cleanup 'remove' event [ 424.519501] kobject: 'tx-0' (ffff888080849c98): kobject_uevent_env [ 424.525884] kobject: 'tx-0' (ffff888080849c98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.535953] kobject: 'tx-0' (ffff888080849c98): auto cleanup kobject_del [ 424.542854] kobject: 'tx-0' (ffff888080849c98): calling ktype release [ 424.549445] kobject: 'tx-0': free name [ 424.553361] kobject: 'queues' (ffff88809fc4c348): kobject_cleanup, parent (null) [ 424.561832] kobject: 'queues' (ffff88809fc4c348): calling ktype release [ 424.568570] kobject: 'queues' (ffff88809fc4c348): kset_release [ 424.574561] kobject: 'queues': free name [ 424.578774] kobject: 'erspan0' (ffff888055234b70): kobject_uevent_env [ 424.585381] kobject: 'erspan0' (ffff888055234b70): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.620306] kobject: 'erspan0' (ffff888055234b70): kobject_cleanup, parent (null) [ 424.628822] kobject: 'erspan0' (ffff888055234b70): calling ktype release [ 424.635740] kobject: 'erspan0': free name [ 424.641334] kobject: 'batman_adv' (ffff8880971e1700): kobject_uevent_env [ 424.648221] kobject: 'batman_adv' (ffff8880971e1700): kobject_uevent_env: filter function caused the event to drop! [ 424.659043] kobject: 'batman_adv' (ffff8880971e1700): kobject_cleanup, parent (null) [ 424.667871] kobject: 'batman_adv' (ffff8880971e1700): calling ktype release [ 424.675002] kobject: (ffff8880971e1700): dynamic_kobj_release [ 424.680914] kobject: 'batman_adv': free name [ 424.685405] kobject: 'rx-0' (ffff88809615d550): kobject_cleanup, parent ffff88805a58f748 [ 424.693662] kobject: 'rx-0' (ffff88809615d550): auto cleanup 'remove' event [ 424.700781] kobject: 'rx-0' (ffff88809615d550): kobject_uevent_env [ 424.707101] kobject: 'rx-0' (ffff88809615d550): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.717287] kobject: 'rx-0' (ffff88809615d550): auto cleanup kobject_del [ 424.724215] kobject: 'rx-0' (ffff88809615d550): calling ktype release [ 424.730883] kobject: 'rx-0': free name [ 424.734802] kobject: 'tx-0' (ffff8880949c2818): kobject_cleanup, parent ffff88805a58f748 [ 424.743077] kobject: 'tx-0' (ffff8880949c2818): auto cleanup 'remove' event [ 424.750207] kobject: 'tx-0' (ffff8880949c2818): kobject_uevent_env [ 424.756511] kobject: 'tx-0' (ffff8880949c2818): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.766587] kobject: 'tx-0' (ffff8880949c2818): auto cleanup kobject_del [ 424.773454] kobject: 'tx-0' (ffff8880949c2818): calling ktype release [ 424.780225] kobject: 'tx-0': free name [ 424.784121] kobject: 'queues' (ffff88805a58f748): kobject_cleanup, parent (null) [ 424.792557] kobject: 'queues' (ffff88805a58f748): calling ktype release [ 424.799299] kobject: 'queues' (ffff88805a58f748): kset_release [ 424.805637] kobject: 'queues': free name [ 424.809844] kobject: 'erspan0' (ffff88805c590cb0): kobject_uevent_env [ 424.816463] kobject: 'erspan0' (ffff88805c590cb0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.840221] kobject: 'erspan0' (ffff88805c590cb0): kobject_cleanup, parent (null) [ 424.848726] kobject: 'erspan0' (ffff88805c590cb0): calling ktype release [ 424.856633] kobject: 'erspan0': free name [ 424.862067] kobject: 'batman_adv' (ffff8880a9451100): kobject_uevent_env [ 424.868906] kobject: 'batman_adv' (ffff8880a9451100): kobject_uevent_env: filter function caused the event to drop! [ 424.879555] kobject: 'batman_adv' (ffff8880a9451100): kobject_cleanup, parent (null) [ 424.888359] kobject: 'batman_adv' (ffff8880a9451100): calling ktype release [ 424.895492] kobject: (ffff8880a9451100): dynamic_kobj_release [ 424.901679] kobject: 'batman_adv': free name [ 424.906174] kobject: 'rx-0' (ffff88809615dd90): kobject_cleanup, parent ffff88809919d648 [ 424.914600] kobject: 'rx-0' (ffff88809615dd90): auto cleanup 'remove' event [ 424.921713] kobject: 'rx-0' (ffff88809615dd90): kobject_uevent_env [ 424.928007] kobject: 'rx-0' (ffff88809615dd90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.938187] kobject: 'rx-0' (ffff88809615dd90): auto cleanup kobject_del [ 424.945079] kobject: 'rx-0' (ffff88809615dd90): calling ktype release [ 424.951675] kobject: 'rx-0': free name [ 424.955572] kobject: 'tx-0' (ffff8880995b8598): kobject_cleanup, parent ffff88809919d648 [ 424.963851] kobject: 'tx-0' (ffff8880995b8598): auto cleanup 'remove' event [ 424.970985] kobject: 'tx-0' (ffff8880995b8598): kobject_uevent_env [ 424.977280] kobject: 'tx-0' (ffff8880995b8598): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.994974] kobject: 'tx-0' (ffff8880995b8598): auto cleanup kobject_del [ 425.001894] kobject: 'tx-0' (ffff8880995b8598): calling ktype release [ 425.008465] kobject: 'tx-0': free name [ 425.012393] kobject: 'queues' (ffff88809919d648): kobject_cleanup, parent (null) [ 425.020831] kobject: 'queues' (ffff88809919d648): calling ktype release [ 425.027573] kobject: 'queues' (ffff88809919d648): kset_release [ 425.033574] kobject: 'queues': free name [ 425.037831] kobject: 'gretap0' (ffff8880949ad3b0): kobject_uevent_env [ 425.045262] kobject: 'gretap0' (ffff8880949ad3b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.090248] kobject: 'gretap0' (ffff8880949ad3b0): kobject_cleanup, parent (null) [ 425.098754] kobject: 'gretap0' (ffff8880949ad3b0): calling ktype release [ 425.106608] kobject: 'gretap0': free name [ 425.111261] kobject: 'batman_adv' (ffff888085083780): kobject_uevent_env [ 425.118150] kobject: 'batman_adv' (ffff888085083780): kobject_uevent_env: filter function caused the event to drop! [ 425.128818] kobject: 'batman_adv' (ffff888085083780): kobject_cleanup, parent (null) [ 425.137609] kobject: 'batman_adv' (ffff888085083780): calling ktype release [ 425.144721] kobject: (ffff888085083780): dynamic_kobj_release [ 425.150736] kobject: 'batman_adv': free name [ 425.155226] kobject: 'rx-0' (ffff88809b891790): kobject_cleanup, parent ffff88809bc8b748 [ 425.163472] kobject: 'rx-0' (ffff88809b891790): auto cleanup 'remove' event [ 425.170711] kobject: 'rx-0' (ffff88809b891790): kobject_uevent_env [ 425.177023] kobject: 'rx-0' (ffff88809b891790): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.187106] kobject: 'rx-0' (ffff88809b891790): auto cleanup kobject_del [ 425.193996] kobject: 'rx-0' (ffff88809b891790): calling ktype release [ 425.205952] kobject: 'rx-0': free name [ 425.209851] kobject: 'tx-0' (ffff88809c1d4a58): kobject_cleanup, parent ffff88809bc8b748 [ 425.218125] kobject: 'tx-0' (ffff88809c1d4a58): auto cleanup 'remove' event [ 425.225250] kobject: 'tx-0' (ffff88809c1d4a58): kobject_uevent_env [ 425.231634] kobject: 'tx-0' (ffff88809c1d4a58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.241695] kobject: 'tx-0' (ffff88809c1d4a58): auto cleanup kobject_del [ 425.248532] kobject: 'tx-0' (ffff88809c1d4a58): calling ktype release [ 425.255140] kobject: 'tx-0': free name [ 425.259025] kobject: 'queues' (ffff88809bc8b748): kobject_cleanup, parent (null) [ 425.267431] kobject: 'queues' (ffff88809bc8b748): calling ktype release [ 425.274184] kobject: 'queues' (ffff88809bc8b748): kset_release [ 425.280166] kobject: 'queues': free name [ 425.284379] kobject: 'gretap0' (ffff8880475b91b0): kobject_uevent_env [ 425.290982] kobject: 'gretap0' (ffff8880475b91b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.320211] kobject: 'gretap0' (ffff8880475b91b0): kobject_cleanup, parent (null) [ 425.328731] kobject: 'gretap0' (ffff8880475b91b0): calling ktype release [ 425.336608] kobject: 'gretap0': free name [ 425.341934] kobject: 'rx-0' (ffff8880a4fec310): kobject_cleanup, parent ffff88809919d148 [ 425.350230] kobject: 'rx-0' (ffff8880a4fec310): auto cleanup 'remove' event [ 425.357318] kobject: 'rx-0' (ffff8880a4fec310): kobject_uevent_env [ 425.363805] kobject: 'rx-0' (ffff8880a4fec310): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.373953] kobject: 'rx-0' (ffff8880a4fec310): auto cleanup kobject_del [ 425.381121] kobject: 'rx-0' (ffff8880a4fec310): calling ktype release [ 425.394817] kobject: 'rx-0': free name [ 425.398825] kobject: 'tx-0' (ffff888092aaba98): kobject_cleanup, parent ffff88809919d148 [ 425.407066] kobject: 'tx-0' (ffff888092aaba98): auto cleanup 'remove' event [ 425.414174] kobject: 'tx-0' (ffff888092aaba98): kobject_uevent_env [ 425.420502] kobject: 'tx-0' (ffff888092aaba98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.430809] kobject: 'tx-0' (ffff888092aaba98): auto cleanup kobject_del [ 425.437652] kobject: 'tx-0' (ffff888092aaba98): calling ktype release [ 425.444542] kobject: 'tx-0': free name [ 425.448478] kobject: 'queues' (ffff88809919d148): kobject_cleanup, parent (null) [ 425.456937] kobject: 'queues' (ffff88809919d148): calling ktype release [ 425.463695] kobject: 'queues' (ffff88809919d148): kset_release [ 425.469649] kobject: 'queues': free name [ 425.473967] kobject: 'gre0' (ffff88808c986630): kobject_uevent_env [ 425.480376] kobject: 'gre0' (ffff88808c986630): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.540253] kobject: 'gre0' (ffff88808c986630): kobject_cleanup, parent (null) [ 425.548513] kobject: 'gre0' (ffff88808c986630): calling ktype release [ 425.555132] kobject: 'gre0': free name [ 425.559363] kobject: 'rx-0' (ffff8880a90c6790): kobject_cleanup, parent ffff8880a72f3248 [ 425.567788] kobject: 'rx-0' (ffff8880a90c6790): auto cleanup 'remove' event [ 425.574933] kobject: 'rx-0' (ffff8880a90c6790): kobject_uevent_env [ 425.581275] kobject: 'rx-0' (ffff8880a90c6790): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.591360] kobject: 'rx-0' (ffff8880a90c6790): auto cleanup kobject_del [ 425.598224] kobject: 'rx-0' (ffff8880a90c6790): calling ktype release [ 425.605105] kobject: 'rx-0': free name [ 425.609050] kobject: 'tx-0' (ffff888081c41558): kobject_cleanup, parent ffff8880a72f3248 [ 425.617311] kobject: 'tx-0' (ffff888081c41558): auto cleanup 'remove' event [ 425.624419] kobject: 'tx-0' (ffff888081c41558): kobject_uevent_env [ 425.630758] kobject: 'tx-0' (ffff888081c41558): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.640826] kobject: 'tx-0' (ffff888081c41558): auto cleanup kobject_del [ 425.647663] kobject: 'tx-0' (ffff888081c41558): calling ktype release [ 425.654256] kobject: 'tx-0': free name [ 425.658143] kobject: 'queues' (ffff8880a72f3248): kobject_cleanup, parent (null) [ 425.666560] kobject: 'queues' (ffff8880a72f3248): calling ktype release [ 425.673321] kobject: 'queues' (ffff8880a72f3248): kset_release [ 425.679271] kobject: 'queues': free name [ 425.683556] kobject: 'gre0' (ffff8880546a08f0): kobject_uevent_env