e299837c426e0c9a45d5d2c959446cc363f370c67cd01a063c91254d692fe35abee92fabda4f66d93228c979ebe036c5c2e0028ec76562d67d0919ca28258fec0ed60603142b5c57c4cfb1ea1e892d0fd2f33970142b179c415d6bea344fbcc82d133052e848a885160737c69eb02ca9f544831c8e3ffcf40cb7b415d24795fc8aaeb8e76bec262aea5e28fe5d6495c4b5895a612b1cc2122286add66356f3ecd309f970634f1b09da1507964d35575167317f13c7fd9f11af27ceea86e9a5b3494a27ba98ba38dd1fb72ef2c6163664fd8f7c946935cd4833121f505ff277c03d959d9a12f3389e9eb6701a8b29f72c20c6abb7bd8349dd2e120bdd59dca9f1a2a877f1677b59d7920ddf29b9d94f7c6879b78e31cf1b65b60fe349ef9d4976f46609ee34e33f647aafbf64f6323d18598905f2e73af75661397595b8f9c1e9a4e993946820da5378ca5b363560e95edce316e99bac6e6250efcf1cb58fdcf94c7557c2d7f763a688543462d54b64e178c2e64c6ebba356894973051907fd8de8ba908e822168b171c1707efcd9ac827e64313721876e2ff26ac34e88557a4a0dfde08eda81cf0c1465a89b68429e48966044c767563e1121db48c9b619fd7362afd15ec6aa19b28759d7977be4fbcad0cf8dd5dc5362259bd5cb5089a9d18db969afe1192571f5fcc0c4d6be281d23b9c1f9f32873c058adfa1bf57a3718686957edfd6e4b58aa959541127696d59fb2810d042ced227961eb19a424e4cf45bc6243217bb7561b7ee11f8c0b8f39480343a26f2da5fe79d5e213c01ea47155ffa91e7d7ba0bc8ccb018bd69cfe71dd8565a645d678b404a295397e83ae69dbf8505f6947a836b44823a92861124330fccd4bc4a2e20d9047bd919d82c89623caa87eb09bd584d58f42b35ef55fddc06dfb3957f3f507e5ca9b8b98947cc5bb68846755527ddf32ffa444e1c7a5654d4d377e04a9f22e1069804fdcdb251acb6bd6b32d100feb44286991d779d2b3e2b7f5cc5f8eb3ae166a3b6fb9df11e1867989a6f9b2028e4c73b4d418b51f6e870713cadafddb47a48c9a97283da214f02db3326d42438d9a7db580693ad1887f99d86bb5fafd6d07c2647fc80c2c5a1ed9ea3b95be65ca422080ddefca5b49ccd538f6bc67390f892d9e416f7e835f76dd90edc56256348d20560caeea05c0922cab60dbf0b57ddaaed6ded5a336e01485fd571dc12050461271cee347c31ac245bfee9128630dfcc43b6d88b5ba9937a6f6ab70b7d256784ff72297cfcfd0ffacd09b55fb832bf60f04d87c48c74972b9f18fa178ce4880b025d1c1097ddb929e8f7e02f1c0e03012bec0fa61a49eb1c2a50a45fc0d98b6649de325184006938e421321e8b366649d9b6ebadf77509c9d48844e80f7752fd7daaa5c938b946feaaac0d871203270a747035c7e2f697c84e792a55cbce76c0a25360f7acbeaab60627aa9c37064af75b67f46732844eb2f6b37226004afe451a9fbfbbcf7e72ade67b017e9209b5627fbe16789abd90326751a1fd1d93efc59f2650f979ba71938d784064922bee2874c4b76d5f26e39ea0a98cf175950137feff9456c88c6a295830183fae3a9c2312c25f3d81708d73488d15a587e7e7cdde3b77917eef29c8b5965c916a65c3c5a53b7313c3115d0a8bb4e16f6b80ff6f78adb756aba94ced86047562a2cd2fb25e9a4656f6359c3f2fde8b5ab38852853cbd7221cb4d59b7f0e79bd37f9ade073f62b75edbe63c13c0d02bf076d88f5b750ea640aad47ce97d6a0783398dd3fbb63734ed969470cf45200235650532224fc28caf1e36ca6b402ec4c978add40fc59f2113485875682139f8aa9aeb48d09178de919370b0cd0ebcab5e60e1b0a2fc153db0dae8e50b48561622a677d0f1afc149676f832e016e14007fb298dcb96f11a92a1ac8bd4cc7b34d659d6cd2c9817b586585e72080255b083bc84512277ffb7f561c6a7a08cd128bfe9b525da531f0bf04f11d3de102b3538835807ac0b2f4325fc6765d02d692ec82f5b338c8257029136fcd3427c09874ecc7492becdd6608eac4adf1abc3f7e08868a72e57ce4dcfc288a25af73d19f1118a9254963c1548cdca5fc7c921a7f218f8e71edd7969dfb35beae1091d7530e32236397fa9fcd232b441ff1b0177829468c198d659d247ccca4fbd58c625501e4368075d0e5e69a6f90952f5bbe48e85a303131dedf7f1a513b291598a545784e1013521877c25d6069d3a855652a4bad5b2df2e4da2de756a20e790b756dd2925ce824561e5892b5e064c7c7b996acc4e29597e0cd00956e9c57ec374714f846be7632d3075e38bead499163498810886c78a2cc73fb64fd48e186083ce911e0751b4dc63476859c2824fa532a4b1711c244619e702eeab19380aeb7b17f67fade3dcad8ddddd893a526cd5d04d8ae982c88029ec71bdd0772fd74adbdb378fc204ca411a2d8a50331516a28552be78f9725f32d1b3a6c7bdf3277c5f7e385c7ebbacc419ec7ca3c5b8f46dbefee59b6422a6b22d60527edc012f852077d925619874f7709f283e01678fed36528003a696ee431a817f34f453c143dc56b70e1f810a5380a555cc8c4fc6522ab544ce5d715caa302ebdd0aa8286b7ef5dd6dd48a8ad9566818f7509daf02db0b98b432f57f1d107ee95a86228728cab4062e27922381e1e2ee351af5e2ea0fd6d1cea70b3b8f4a50f0776fc9aa2a7d2dff6e1ea3769864104f09137b99960b69af13895d842649eacaed8ddf183beba3323640af8deb52b902c0974d685d19fc87c93eb80ad5d28e54363705ad39231d989522e94f000256bc8d93af138a45d67dad3e21fa9fb31d9327c6e71f61956d9daf4f97333112704136d3d1bf6fe0e4c002e10b684d2344300ec70fae0b50532ebace58f0e8318354a172cceacf27d01ff41cc8fef42443f62b0e15b5fcc0728630b96fb2c2b59634f4993bb1ce2eace6fb0f53e5f84bc5f58b1b66d59e3c75a98670496f105a703607211aa9e882e72f13e9fe07f0767ad4e5ac5c732b65301d8ceab36b5ff2f71958fb1b51d2e703ac506e68d4026160fd3f60440b8b8f554f1feeba5d53f71cbe60d143620f8fa779acb94c965b729207a5ab11f4a51b694c31606171da44a28d80cde296dff5724ff718d6377eb8534e616cff39af943ee4ce87b4fadded30c702d370a71072ab3e20f19b8c1b73fdbbb9c675352bb73ee85e22597fc0c439a33f5febe1629bd084af7193f8d1a1415b02ca54706711505cbae11ec6411b012cc3a3eddcfb002901b6e7565b9fbf4d605c147031888ceb590c14697d00970ce9095c6f7fee41ec6a15d7ef52dfedfff2a0d3dbb387b61232aee6ca202787038021e6aabda18e2adf6fd89aa491e65f9813d73412fbfff089752d713d7efa690ec4fc254b56908d3057f65997acf81aea589e272f8fa852849e488f1e0c0cb6cdb5f46ca92e36d39224e704850056d2e9b91909aed0f55d054e274415ecc39b8958335a14cfb0a42d7f26ef8e82592dfd03b3550b5193fba077994c682951968869574fd94976760d9bd9b334353eeda836cc8dab244e72095cc46833f02bb2f6df35601b3085664261abb67fc9ab9f27210e6827cd15ce16c55f0f7f5b8ab401f24032b19a53a9299b62ebf4a8cf7f4753d95126f008a8ce349036666de66bcaf40b27fa875efa98873e1ef9302e2a24bfe07bd1054bdf9ba9ad1b1075402f26d682833b947c762513ba5f07537bb712473184a60e04ace5adb8d982d6153b011ae0b2034adc0ff4a64e2c6561c2e0840cdab2120bc916cde9b7a92c4d332d0f83945fe55e3c8f4d93f22e7759c20241d92cca0ae5a3d06a127e5614df708cea1ad3b2f231c81460ff4c3f349c67a87135a4b67589ffce311832923f71796276e81f0537e265404c0ee06d5ed98a5ec5f8ad62db589eb585fc4627173b51fd4e897a3e8d2acbb82ec2996ac3a6823368a1e12a0536a9d1a7b2d31d80c46c292ff51395481d4f65c53fab867e27bec9156ee189d245d94877a1405dc9e1e996822ad47071a9ab36c9bfd02c41ea5ba21591793053b1b64758bae0addfcd69d169849bc1ee6ce5c08f0d3da5ecc1b6ab31e13af2fa5ce4d921163270901264a88ac6350e8fb6371663dd04146932238597258b123a8036250c190fbb3cfc6ebbf9e06c4a9053e8332c95c91a890a3d35ddd35f47e7ab606f3e345e12560e6d52243883da7b8910834042ad12e7fb3f08a0b14ef6aee22251999e6079be2ef5666d7d5ae00d161720262761da3f378c63cb151f4e94d034e9de949dfe796b905804ca555691023c30ea7cf0cb276e1e3ba65793291f8287d1064606bf5787421b9b9bfc05e9c5eac750de92519fe9e2592cd34a2ef6ec18efed5e7c13bfcfce47327cbecac358bbe6d44164849308cf91cd5ea87fa4b02ba4939e28141c7dad42714b019470d91808a8f46150677b6c90f267ecb39ef42afc95de0cbd016775c89d8213ec9d4e061e6493f237296f91abfc64176c0e885ef54af4136a724fadfe89a25d7599998acebc4a27f8fb5b26936bda5c3d5fec3373dcd9a0e99fc939641c50669adc54119582e8835575d1c57fa955cd29d870360620f91c3ff90d264013816352317ae226f7d7bad5db711f8973382f6cebd63cd519ddd08e1772649be75f64f4acc15f828dc0b305584b6dd2213194603c44e2964358d305aa97fb08568a0a955ad7a6f8d042754b4bbf2fb3414052719fd9841bef8360d1d3195c69414be882115c2c64fecdcbdaed3a2e943fdfef9a13520e41d32a787bcfe4f61e2b378d35aa70784a772cf8ebcaaeb105e4627516db2ababfcb8c11f224c3a48c86160d34d0ee59f02c31648ae4b0309b378f0bf63266967dcfb4f1cc1902f613c6d0d48915a9cf28a52b106544cde1b38ff2e2a1275fd0d3899ce7f7c6653c9017f7ac4aaa35bcb2811a8f9dbb56746b45475350e7c13d42abb5692377da7a4045ee644ce00f8699e3251d75621c82cd659ea3add277affe3ff792f7d24a3d0979ef82cfc0d409697ae2e8598854a8327f46974c901d309dc6dbe31913c59d821aa50c0fe95cc822e8f07bbb00e9a09bc9a570b9778d29308740bc336a41258d209c206f87a709aa43415da0096f7d177e509a7d625645fb098ccc45367d82235e952670ac5f82f8ced3f59fd9ee20ac75be609cc832417e807ddc40630cba4c91e0785edcb5f20b9e6dedb1ec172cd16fc034f410e9ce375ea855144aa3076317f649cf4efe4d7abf244984c4e", 0xff54}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000100)=0xec, 0x8080ffffff06) 00:08:59 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) r0 = socket(0x2, 0x100000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) 00:08:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x74}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 00:08:59 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x18, r0, 0x0) r2 = fanotify_init(0x6, 0x0) fanotify_mark(r2, 0x1, 0x40000010, r0, 0x0) 00:08:59 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x18, r0, 0x0) r2 = fanotify_init(0x6, 0x0) fanotify_mark(r2, 0x1, 0x40000010, r0, 0x0) 00:08:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x74}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 00:08:59 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) r0 = socket(0x2, 0x100000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) 00:09:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x74}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 00:09:00 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) r0 = socket(0x2, 0x100000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) [ 885.723322][ C0] net_ratelimit: 24 callbacks suppressed [ 885.723376][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 885.734966][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 886.682851][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 886.688840][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 886.695162][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 886.700986][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 887.002759][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 887.008611][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 887.014526][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 887.020471][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:01 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:01 executing program 0: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x18, r0, 0x0) r2 = fanotify_init(0x6, 0x0) fanotify_mark(r2, 0x1, 0x40000010, r0, 0x0) 00:09:01 executing program 3: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x18, r0, 0x0) r2 = fanotify_init(0x6, 0x0) fanotify_mark(r2, 0x1, 0x40000010, r0, 0x0) 00:09:01 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) r0 = socket(0x2, 0x100000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) 00:09:01 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x18, r0, 0x0) r2 = fanotify_init(0x6, 0x0) fanotify_mark(r2, 0x1, 0x40000010, r0, 0x0) 00:09:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xff54}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000100)=0xec, 0x8080ffffff06) 00:09:01 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) r0 = socket(0x2, 0x100000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) 00:09:01 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x18, r0, 0x0) r2 = fanotify_init(0x6, 0x0) fanotify_mark(r2, 0x1, 0x40000010, r0, 0x0) 00:09:02 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:02 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:02 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) r0 = socket(0x2, 0x100000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) 00:09:02 executing program 1: mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x18, r0, 0x0) r2 = fanotify_init(0x6, 0x0) fanotify_mark(r2, 0x1, 0x40000010, r0, 0x0) 00:09:04 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:04 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="ce494278b6bf11ae642bd2cfeeb2", 0x0, 0xffff}, 0x28) 00:09:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:04 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:04 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) [ 889.956365][T10343] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 00:09:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="ce494278b6bf11ae642bd2cfeeb2", 0x0, 0xffff}, 0x28) [ 890.209579][T10354] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 00:09:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="ce494278b6bf11ae642bd2cfeeb2", 0x0, 0xffff}, 0x28) 00:09:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 890.499526][T10338] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 890.557657][T10338] CPU: 1 PID: 10338 Comm: syz-executor.3 Not tainted 5.1.0-rc1-next-20190318 #5 [ 890.566760][T10338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.576832][T10338] Call Trace: [ 890.580149][T10338] dump_stack+0x172/0x1f0 [ 890.584500][T10338] dump_header+0x10f/0xb6c [ 890.588931][T10338] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 890.594778][T10338] ? ___ratelimit+0x60/0x595 [ 890.599379][T10338] ? do_raw_spin_unlock+0x57/0x270 [ 890.604508][T10338] oom_kill_process.cold+0x10/0x15 [ 890.609635][T10338] out_of_memory+0x79a/0x1280 [ 890.614327][T10338] ? lock_downgrade+0x880/0x880 [ 890.619370][T10338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.625637][T10338] ? oom_killer_disable+0x280/0x280 [ 890.630843][T10338] ? find_held_lock+0x35/0x130 [ 890.635652][T10338] mem_cgroup_out_of_memory+0x1ca/0x230 [ 890.641302][T10338] ? memcg_event_wake+0x230/0x230 [ 890.646358][T10338] ? do_raw_spin_unlock+0x57/0x270 [ 890.651482][T10338] ? _raw_spin_unlock+0x2d/0x50 [ 890.656345][T10338] try_charge+0x118d/0x1790 [ 890.660868][T10338] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 890.666426][T10338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.672679][T10338] ? kasan_check_read+0x11/0x20 [ 890.677543][T10338] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 890.683117][T10338] mem_cgroup_try_charge+0x24d/0x5e0 [ 890.688424][T10338] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 890.694128][T10338] __handle_mm_fault+0x1e1f/0x3ec0 [ 890.699263][T10338] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 890.704819][T10338] ? find_held_lock+0x35/0x130 [ 890.709585][T10338] ? handle_mm_fault+0x322/0xb30 [ 890.714546][T10338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.721347][T10338] ? kasan_check_read+0x11/0x20 [ 890.726213][T10338] handle_mm_fault+0x43f/0xb30 [ 890.731001][T10338] __get_user_pages+0x7b6/0x1a40 [ 890.735970][T10338] ? follow_page_mask+0x19a0/0x19a0 [ 890.741191][T10338] ? __vma_adjust+0x1840/0x1840 [ 890.746060][T10338] ? lock_acquire+0x16f/0x3f0 [ 890.750749][T10338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.757033][T10338] populate_vma_page_range+0x20d/0x2a0 [ 890.762520][T10338] __mm_populate+0x204/0x380 [ 890.767560][T10338] ? populate_vma_page_range+0x2a0/0x2a0 [ 890.773217][T10338] __x64_sys_mlockall+0x35c/0x520 [ 890.778264][T10338] do_syscall_64+0x103/0x610 [ 890.782887][T10338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.788805][T10338] RIP: 0033:0x458079 [ 890.792722][T10338] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 890.812519][T10338] RSP: 002b:00007f4836c32c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 890.823411][T10338] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458079 [ 890.831889][T10338] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000400000003 [ 890.839915][T10338] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 890.847923][T10338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4836c336d4 00:09:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="ce494278b6bf11ae642bd2cfeeb2", 0x0, 0xffff}, 0x28) [ 890.855925][T10338] R13: 00000000004c3d3a R14: 00000000004d6f20 R15: 00000000ffffffff [ 890.864558][ C1] net_ratelimit: 16 callbacks suppressed [ 890.864572][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 890.876472][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 890.882504][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 890.888774][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 890.914046][T10338] memory: usage 307200kB, limit 307200kB, failcnt 177 [ 890.922689][T10338] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 890.931805][T10338] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 890.939129][T10338] Memory cgroup stats for /syz3: cache:48KB rss:279492KB rss_huge:221184KB shmem:12KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:127668KB active_anon:135440KB inactive_file:8KB active_file:8KB unevictable:16408KB 00:09:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="ce494278b6bf11ae642bd2cfeeb2", 0x0, 0xffff}, 0x28) [ 890.992450][T10338] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8605,uid=0 [ 891.016591][T10369] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 891.052268][T10338] Memory cgroup out of memory: Killed process 8605 (syz-executor.3) total-vm:72580kB, anon-rss:18244kB, file-rss:34944kB, shmem-rss:0kB [ 891.148131][ T1044] oom_reaper: reaped process 8605 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 891.160637][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 891.166482][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 891.172422][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 891.178239][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 891.184133][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 891.189934][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 891.201671][T10349] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 891.248128][T10349] CPU: 1 PID: 10349 Comm: syz-executor.4 Not tainted 5.1.0-rc1-next-20190318 #5 [ 891.257208][T10349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.267291][T10349] Call Trace: [ 891.270623][T10349] dump_stack+0x172/0x1f0 [ 891.274977][T10349] dump_header+0x10f/0xb6c [ 891.279415][T10349] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 891.285238][T10349] ? ___ratelimit+0x60/0x595 [ 891.289849][T10349] ? do_raw_spin_unlock+0x57/0x270 [ 891.294996][T10349] oom_kill_process.cold+0x10/0x15 [ 891.300126][T10349] out_of_memory+0x79a/0x1280 [ 891.304837][T10349] ? oom_killer_disable+0x280/0x280 [ 891.310055][T10349] ? find_held_lock+0x35/0x130 [ 891.314847][T10349] mem_cgroup_out_of_memory+0x1ca/0x230 [ 891.320406][T10349] ? memcg_event_wake+0x230/0x230 [ 891.325462][T10349] ? do_raw_spin_unlock+0x57/0x270 [ 891.330602][T10349] ? _raw_spin_unlock+0x2d/0x50 [ 891.335480][T10349] try_charge+0x118d/0x1790 [ 891.340026][T10349] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 891.345765][T10349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.352034][T10349] ? kasan_check_read+0x11/0x20 [ 891.356916][T10349] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 891.362484][T10349] mem_cgroup_try_charge+0x24d/0x5e0 [ 891.367804][T10349] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 891.373458][T10349] __handle_mm_fault+0x1e1f/0x3ec0 [ 891.378596][T10349] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 891.384173][T10349] ? find_held_lock+0x35/0x130 [ 891.388965][T10349] ? handle_mm_fault+0x322/0xb30 [ 891.394156][T10349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.400517][T10349] ? sync_mm_rss+0xa4/0x1c0 [ 891.405062][T10349] handle_mm_fault+0x43f/0xb30 [ 891.409943][T10349] __get_user_pages+0x7b6/0x1a40 [ 891.414971][T10349] ? follow_page_mask+0x19a0/0x19a0 [ 891.420228][T10349] ? __vma_adjust+0x1840/0x1840 [ 891.425143][T10349] ? lock_acquire+0x16f/0x3f0 [ 891.429852][T10349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 891.436130][T10349] populate_vma_page_range+0x20d/0x2a0 [ 891.441627][T10349] __mm_populate+0x204/0x380 [ 891.446253][T10349] ? populate_vma_page_range+0x2a0/0x2a0 [ 891.451923][T10349] __x64_sys_mlockall+0x35c/0x520 [ 891.456974][T10349] do_syscall_64+0x103/0x610 [ 891.461589][T10349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.467504][T10349] RIP: 0033:0x458079 [ 891.471421][T10349] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 891.491076][T10349] RSP: 002b:00007fc0039c2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 891.499517][T10349] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458079 [ 891.507809][T10349] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000400000003 [ 891.515821][T10349] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 891.523915][T10349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc0039c36d4 [ 891.531914][T10349] R13: 00000000004c3d3a R14: 00000000004d6f20 R15: 00000000ffffffff [ 891.557452][T10349] memory: usage 307200kB, limit 307200kB, failcnt 101 [ 891.569524][T10349] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 891.589657][T10349] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 891.597958][T10349] Memory cgroup stats for /syz4: cache:0KB rss:275416KB rss_huge:204800KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:101368KB active_anon:164004KB inactive_file:36KB active_file:4KB unevictable:10224KB [ 891.639134][T10349] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8606,uid=0 [ 891.665329][T10349] Memory cgroup out of memory: Killed process 8606 (syz-executor.4) total-vm:72580kB, anon-rss:18244kB, file-rss:34816kB, shmem-rss:0kB [ 893.054579][T10346] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 893.067771][T10346] CPU: 0 PID: 10346 Comm: syz-executor.4 Not tainted 5.1.0-rc1-next-20190318 #5 [ 893.078459][T10346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.088531][T10346] Call Trace: [ 893.091915][T10346] dump_stack+0x172/0x1f0 [ 893.096282][T10346] dump_header+0x10f/0xb6c [ 893.100718][T10346] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 893.106534][T10346] ? ___ratelimit+0x60/0x595 [ 893.111122][T10346] ? do_raw_spin_unlock+0x57/0x270 [ 893.116231][T10346] oom_kill_process.cold+0x10/0x15 [ 893.121339][T10346] out_of_memory+0x79a/0x1280 [ 893.126181][T10346] ? lock_downgrade+0x880/0x880 [ 893.131282][T10346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.137628][T10346] ? oom_killer_disable+0x280/0x280 [ 893.142818][T10346] ? find_held_lock+0x35/0x130 [ 893.147603][T10346] mem_cgroup_out_of_memory+0x1ca/0x230 [ 893.153138][T10346] ? memcg_event_wake+0x230/0x230 [ 893.158156][T10346] ? do_raw_spin_unlock+0x57/0x270 [ 893.163258][T10346] ? _raw_spin_unlock+0x2d/0x50 [ 893.168094][T10346] try_charge+0x118d/0x1790 [ 893.172606][T10346] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 893.178147][T10346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.184404][T10346] ? kasan_check_read+0x11/0x20 [ 893.189279][T10346] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 893.194813][T10346] mem_cgroup_try_charge+0x24d/0x5e0 [ 893.200098][T10346] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 893.205724][T10346] do_huge_pmd_wp_page+0x99d/0x3660 [ 893.211065][T10346] ? ext4_set_page_dirty+0x275/0x430 [ 893.216384][T10346] ? __split_huge_pmd+0x2b00/0x2b00 [ 893.221931][T10346] ? put_page+0xce/0x130 [ 893.226178][T10346] ? do_wp_page+0x5e0/0x16c0 [ 893.230768][T10346] ? pmd_val+0x85/0x100 [ 893.234934][T10346] ? add_mm_counter_fast.part.0+0x40/0x40 [ 893.240652][T10346] ? __lock_acquire+0x548/0x3fb0 [ 893.245603][T10346] __handle_mm_fault+0x1651/0x3ec0 [ 893.250880][T10346] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 893.256430][T10346] ? find_held_lock+0x35/0x130 [ 893.261182][T10346] ? handle_mm_fault+0x322/0xb30 [ 893.266115][T10346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.272354][T10346] ? kasan_check_read+0x11/0x20 [ 893.277213][T10346] handle_mm_fault+0x43f/0xb30 [ 893.282015][T10346] __do_page_fault+0x5ef/0xda0 [ 893.286878][T10346] do_page_fault+0x71/0x581 [ 893.291436][T10346] ? page_fault+0x8/0x30 [ 893.295676][T10346] page_fault+0x1e/0x30 [ 893.299812][T10346] RIP: 0033:0x43f381 [ 893.303715][T10346] Code: 2e 0f 1f 84 00 00 00 00 00 48 83 fa 20 48 89 f8 73 77 f6 c2 01 74 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e <66> 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e [ 893.323319][T10346] RSP: 002b:00007ffcf8680118 EFLAGS: 00010202 [ 893.329385][T10346] RAX: 0000000020dec000 RBX: 000000000073c900 RCX: 0000000000006d73 [ 893.337468][T10346] RDX: 0000000000000006 RSI: 0000000000741a18 RDI: 0000000020dec000 [ 893.345468][T10346] RBP: 000000000073c900 R08: ffffffff8100a1ae R09: 00000000dfba67ed [ 893.353537][T10346] R10: 00007ffcf86801e0 R11: 0000000000000246 R12: fffffffffffffffe [ 893.361726][T10346] R13: 00000000000da1a7 R14: 00000000000003e8 R15: 000000000073bfac [ 893.370901][T10346] ? do_syscall_64+0x1fe/0x610 [ 893.381325][T10346] memory: usage 307156kB, limit 307200kB, failcnt 144 [ 893.388221][T10346] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 893.396810][T10346] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 893.404090][T10346] Memory cgroup stats for /syz4: cache:0KB rss:273588KB rss_huge:196608KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:93468KB active_anon:163984KB inactive_file:16KB active_file:4KB unevictable:16320KB [ 893.426605][T10346] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8640,uid=0 [ 893.442332][T10346] Memory cgroup out of memory: Killed process 8640 (syz-executor.4) total-vm:72580kB, anon-rss:18244kB, file-rss:34816kB, shmem-rss:0kB [ 893.463796][ T1044] oom_reaper: reaped process 8640 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 00:09:08 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="ce494278b6bf11ae642bd2cfeeb2", 0x0, 0xffff}, 0x28) 00:09:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:08 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:08 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:08 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) [ 893.697463][T10392] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 893.767470][T10388] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 893.828409][T10388] CPU: 1 PID: 10388 Comm: syz-executor.0 Not tainted 5.1.0-rc1-next-20190318 #5 [ 893.837507][T10388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.847598][T10388] Call Trace: [ 893.850918][T10388] dump_stack+0x172/0x1f0 [ 893.855267][T10388] dump_header+0x10f/0xb6c [ 893.859722][T10388] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 893.865551][T10388] ? ___ratelimit+0x60/0x595 [ 893.870183][T10388] ? do_raw_spin_unlock+0x57/0x270 [ 893.875332][T10388] oom_kill_process.cold+0x10/0x15 [ 893.880466][T10388] out_of_memory+0x79a/0x1280 [ 893.885162][T10388] ? lock_downgrade+0x880/0x880 [ 893.890040][T10388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.896306][T10388] ? oom_killer_disable+0x280/0x280 [ 893.901515][T10388] ? find_held_lock+0x35/0x130 [ 893.906308][T10388] mem_cgroup_out_of_memory+0x1ca/0x230 [ 893.911867][T10388] ? memcg_event_wake+0x230/0x230 [ 893.917006][T10388] ? do_raw_spin_unlock+0x57/0x270 [ 893.922136][T10388] ? _raw_spin_unlock+0x2d/0x50 [ 893.927125][T10388] try_charge+0x118d/0x1790 [ 893.931670][T10388] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 893.937331][T10388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.943589][T10388] ? kasan_check_read+0x11/0x20 [ 893.948458][T10388] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 893.954051][T10388] mem_cgroup_try_charge+0x24d/0x5e0 [ 893.959364][T10388] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 893.965150][T10388] __handle_mm_fault+0x1e1f/0x3ec0 [ 893.970315][T10388] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 893.975910][T10388] ? find_held_lock+0x35/0x130 [ 893.980786][T10388] ? handle_mm_fault+0x322/0xb30 [ 893.985761][T10388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 893.992041][T10388] ? kasan_check_read+0x11/0x20 [ 893.996933][T10388] handle_mm_fault+0x43f/0xb30 [ 894.001730][T10388] __get_user_pages+0x7b6/0x1a40 [ 894.006791][T10388] ? follow_page_mask+0x19a0/0x19a0 [ 894.012011][T10388] ? __vma_adjust+0x1840/0x1840 [ 894.016883][T10388] ? lock_acquire+0x16f/0x3f0 [ 894.021588][T10388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.028188][T10388] populate_vma_page_range+0x20d/0x2a0 [ 894.033686][T10388] __mm_populate+0x204/0x380 [ 894.038304][T10388] ? populate_vma_page_range+0x2a0/0x2a0 [ 894.043971][T10388] __x64_sys_mlockall+0x35c/0x520 [ 894.049015][T10388] do_syscall_64+0x103/0x610 [ 894.053631][T10388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 894.059537][T10388] RIP: 0033:0x458079 [ 894.063445][T10388] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 894.083069][T10388] RSP: 002b:00007faa2e1e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 894.091521][T10388] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458079 [ 894.099533][T10388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000400000003 [ 894.107526][T10388] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 894.115610][T10388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa2e1e56d4 00:09:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="ce494278b6bf11ae642bd2cfeeb2", 0x0, 0xffff}, 0x28) [ 894.123784][T10388] R13: 00000000004c3d3a R14: 00000000004d6f20 R15: 00000000ffffffff [ 894.213243][T10397] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 00:09:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 894.366125][T10388] memory: usage 307200kB, limit 307200kB, failcnt 78 [ 894.379721][T10388] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 894.387459][T10388] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 00:09:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 894.406408][T10388] Memory cgroup stats for /syz0: cache:44KB rss:274068KB rss_huge:219136KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:91208KB active_anon:181396KB inactive_file:0KB active_file:12KB unevictable:1684KB 00:09:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 894.494226][T10388] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8581,uid=0 [ 894.545705][T10388] Memory cgroup out of memory: Killed process 8581 (syz-executor.0) total-vm:72580kB, anon-rss:18244kB, file-rss:34816kB, shmem-rss:0kB 00:09:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 894.660450][T10385] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 894.719110][T10385] CPU: 1 PID: 10385 Comm: syz-executor.3 Not tainted 5.1.0-rc1-next-20190318 #5 [ 894.728758][T10385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.738837][T10385] Call Trace: [ 894.742155][T10385] dump_stack+0x172/0x1f0 [ 894.746506][T10385] dump_header+0x10f/0xb6c [ 894.750943][T10385] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 894.756767][T10385] ? ___ratelimit+0x60/0x595 [ 894.761368][T10385] ? do_raw_spin_unlock+0x57/0x270 [ 894.764861][T10417] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 894.766509][T10385] oom_kill_process.cold+0x10/0x15 [ 894.780994][T10385] out_of_memory+0x79a/0x1280 [ 894.785695][T10385] ? oom_killer_disable+0x280/0x280 [ 894.791004][T10385] ? find_held_lock+0x35/0x130 [ 894.795801][T10385] mem_cgroup_out_of_memory+0x1ca/0x230 [ 894.802598][T10385] ? memcg_event_wake+0x230/0x230 [ 894.807662][T10385] ? do_raw_spin_unlock+0x57/0x270 [ 894.812801][T10385] ? _raw_spin_unlock+0x2d/0x50 [ 894.817683][T10385] try_charge+0x118d/0x1790 [ 894.822382][T10385] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 894.827961][T10385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.834254][T10385] ? kasan_check_read+0x11/0x20 [ 894.839143][T10385] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 894.844716][T10385] mem_cgroup_try_charge+0x24d/0x5e0 [ 894.850027][T10385] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 894.855681][T10385] __handle_mm_fault+0x1e1f/0x3ec0 [ 894.860817][T10385] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 894.866391][T10385] ? find_held_lock+0x35/0x130 [ 894.871182][T10385] ? handle_mm_fault+0x322/0xb30 [ 894.876170][T10385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.882573][T10385] ? kasan_check_read+0x11/0x20 [ 894.887545][T10385] handle_mm_fault+0x43f/0xb30 [ 894.892352][T10385] __get_user_pages+0x7b6/0x1a40 [ 894.897323][T10385] ? follow_page_mask+0x19a0/0x19a0 [ 894.902542][T10385] ? __vma_adjust+0x1840/0x1840 [ 894.907420][T10385] ? lock_acquire+0x16f/0x3f0 [ 894.912219][T10385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 894.918507][T10385] populate_vma_page_range+0x20d/0x2a0 [ 894.923994][T10385] __mm_populate+0x204/0x380 [ 894.928698][T10385] ? populate_vma_page_range+0x2a0/0x2a0 [ 894.934378][T10385] __x64_sys_mlockall+0x35c/0x520 [ 894.939430][T10385] do_syscall_64+0x103/0x610 [ 894.944062][T10385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 894.949974][T10385] RIP: 0033:0x458079 [ 894.953884][T10385] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 894.973507][T10385] RSP: 002b:00007f4836c32c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 894.981939][T10385] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458079 [ 894.989930][T10385] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000400000003 [ 894.997934][T10385] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 895.005932][T10385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4836c336d4 [ 895.013942][T10385] R13: 00000000004c3d3a R14: 00000000004d6f20 R15: 00000000ffffffff [ 895.124247][T10385] memory: usage 307200kB, limit 307200kB, failcnt 211 [ 895.134671][T10385] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 895.145347][T10385] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 895.235887][T10385] Memory cgroup stats for /syz3: cache:48KB rss:279488KB rss_huge:206848KB shmem:12KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:127672KB active_anon:135436KB inactive_file:0KB active_file:4KB unevictable:16476KB [ 895.354872][T10385] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8634,uid=0 [ 895.425785][T10385] Memory cgroup out of memory: Killed process 8634 (syz-executor.3) total-vm:72580kB, anon-rss:18244kB, file-rss:34816kB, shmem-rss:0kB [ 895.507605][ T1044] oom_reaper: reaped process 8634 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 896.053046][T10388] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 896.069717][T10388] CPU: 0 PID: 10388 Comm: syz-executor.0 Not tainted 5.1.0-rc1-next-20190318 #5 [ 896.078772][T10388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 896.088842][T10388] Call Trace: [ 896.092152][T10388] dump_stack+0x172/0x1f0 [ 896.096501][T10388] dump_header+0x10f/0xb6c [ 896.101022][T10388] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 896.106839][T10388] ? ___ratelimit+0x60/0x595 [ 896.111448][T10388] ? do_raw_spin_unlock+0x57/0x270 [ 896.116577][T10388] oom_kill_process.cold+0x10/0x15 [ 896.121705][T10388] out_of_memory+0x79a/0x1280 [ 896.126397][T10388] ? retint_kernel+0x2d/0x2d [ 896.131011][T10388] ? oom_killer_disable+0x280/0x280 [ 896.136232][T10388] mem_cgroup_out_of_memory+0x1ca/0x230 [ 896.141805][T10388] ? memcg_event_wake+0x230/0x230 [ 896.146857][T10388] ? do_raw_spin_unlock+0x57/0x270 [ 896.151983][T10388] ? _raw_spin_unlock+0x2d/0x50 [ 896.156851][T10388] try_charge+0x118d/0x1790 [ 896.161374][T10388] ? lock_release+0x4c1/0xa00 [ 896.166096][T10388] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 896.171665][T10388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 896.177925][T10388] ? kasan_check_read+0x11/0x20 [ 896.182802][T10388] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 896.188408][T10388] mem_cgroup_try_charge+0x24d/0x5e0 [ 896.193732][T10388] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 896.199379][T10388] __handle_mm_fault+0x1e1f/0x3ec0 [ 896.204518][T10388] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 896.210081][T10388] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 896.215573][T10388] ? handle_mm_fault+0x3f1/0xb30 [ 896.220523][T10388] handle_mm_fault+0x43f/0xb30 [ 896.225297][T10388] __get_user_pages+0x7b6/0x1a40 [ 896.230263][T10388] ? follow_page_mask+0x19a0/0x19a0 [ 896.235478][T10388] ? retint_kernel+0x2d/0x2d [ 896.240102][T10388] populate_vma_page_range+0x20d/0x2a0 [ 896.245658][T10388] __mm_populate+0x204/0x380 [ 896.250263][T10388] ? populate_vma_page_range+0x2a0/0x2a0 [ 896.255942][T10388] ? call_rwsem_wake+0x1b/0x30 [ 896.260902][T10388] __x64_sys_mremap+0x7dc/0xb80 [ 896.265782][T10388] ? mremap_to+0x840/0x840 [ 896.270229][T10388] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 896.275704][T10388] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 896.281179][T10388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.287261][T10388] ? do_syscall_64+0x26/0x610 [ 896.291957][T10388] ? lockdep_hardirqs_on+0x418/0x5d0 [ 896.297276][T10388] ? trace_hardirqs_on+0x67/0x230 [ 896.302322][T10388] do_syscall_64+0x103/0x610 [ 896.306946][T10388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 896.312857][T10388] RIP: 0033:0x458079 [ 896.316787][T10388] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 896.336418][T10388] RSP: 002b:00007faa2e1e4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 896.344850][T10388] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458079 [ 896.352835][T10388] RDX: 0000000000800000 RSI: 0000000000002000 RDI: 0000000020a94000 [ 896.360815][T10388] RBP: 000000000073bf00 R08: 0000000020130000 R09: 0000000000000000 [ 896.368797][T10388] R10: 0000000000000003 R11: 0000000000000246 R12: 00007faa2e1e56d4 [ 896.376789][T10388] R13: 00000000004c3e8d R14: 00000000004d71c0 R15: 00000000ffffffff [ 896.476006][ C0] net_ratelimit: 24 callbacks suppressed [ 896.476036][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 896.488292][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 896.522779][T10388] memory: usage 307200kB, limit 307200kB, failcnt 116 [ 896.531378][T10388] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 896.544449][T10388] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 896.552848][T10388] Memory cgroup stats for /syz0: cache:44KB rss:273972KB rss_huge:202752KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:81256KB active_anon:181380KB inactive_file:4KB active_file:0KB unevictable:11576KB [ 896.582373][T10388] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8614,uid=0 [ 896.604512][T10388] Memory cgroup out of memory: Killed process 8614 (syz-executor.0) total-vm:72580kB, anon-rss:18244kB, file-rss:34816kB, shmem-rss:0kB [ 896.730981][ T1044] oom_reaper: reaped process 8614 (syz-executor.0), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 897.079171][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 897.086516][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 897.094010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 897.100792][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 897.643462][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 897.650525][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 897.657617][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 897.663895][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:13 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2001, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000140)) mlockall(0x0) inotify_init1(0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mlockall(0x400000003) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) 00:09:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 899.067620][T10430] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 899.199643][T10427] FS-Cache: Duplicate cookie detected [ 899.205185][T10427] FS-Cache: O-cookie c=0000000042584e3b [p=00000000c2baab65 fl=222 nc=0 na=1] [ 899.214441][T10427] FS-Cache: O-cookie d=000000004dd2dd19 n=00000000d341046d [ 899.222271][T10427] FS-Cache: O-key=[10] '02000200000002000000' [ 899.229440][T10427] FS-Cache: N-cookie c=00000000c4597a7d [p=00000000c2baab65 fl=2 nc=0 na=1] [ 899.238373][T10427] FS-Cache: N-cookie d=000000004dd2dd19 n=00000000ea603dea [ 899.245692][T10427] FS-Cache: N-key=[10] '02000200000002000000' [ 899.285596][T10432] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 900.150705][T10438] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 900.170969][T10423] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 900.185195][T10423] CPU: 1 PID: 10423 Comm: syz-executor.2 Not tainted 5.1.0-rc1-next-20190318 #5 [ 900.194278][T10423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.204355][T10423] Call Trace: [ 900.207671][T10423] dump_stack+0x172/0x1f0 [ 900.212023][T10423] dump_header+0x10f/0xb6c [ 900.216457][T10423] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 900.222300][T10423] ? ___ratelimit+0x60/0x595 [ 900.226996][T10423] ? do_raw_spin_unlock+0x57/0x270 [ 900.232139][T10423] oom_kill_process.cold+0x10/0x15 [ 900.237278][T10423] out_of_memory+0x79a/0x1280 [ 900.241991][T10423] ? lock_downgrade+0x880/0x880 [ 900.246859][T10423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.253128][T10423] ? oom_killer_disable+0x280/0x280 [ 900.258518][T10423] ? find_held_lock+0x35/0x130 [ 900.263404][T10423] mem_cgroup_out_of_memory+0x1ca/0x230 [ 900.268976][T10423] ? memcg_event_wake+0x230/0x230 [ 900.274029][T10423] ? do_raw_spin_unlock+0x57/0x270 [ 900.279168][T10423] ? _raw_spin_unlock+0x2d/0x50 [ 900.284056][T10423] try_charge+0x118d/0x1790 [ 900.288588][T10423] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 900.294156][T10423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 00:09:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 900.300434][T10423] ? kasan_check_read+0x11/0x20 [ 900.305305][T10423] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 900.310884][T10423] mem_cgroup_try_charge+0x24d/0x5e0 [ 900.316200][T10423] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 900.321867][T10423] wp_page_copy+0x408/0x1740 [ 900.326569][T10423] ? find_held_lock+0x35/0x130 [ 900.331362][T10423] ? pmd_pfn+0x1d0/0x1d0 [ 900.335626][T10423] ? lock_downgrade+0x880/0x880 [ 900.340506][T10423] ? swp_swapcount+0x540/0x540 [ 900.345296][T10423] ? kasan_check_read+0x11/0x20 00:09:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 900.350178][T10423] ? do_raw_spin_unlock+0x57/0x270 [ 900.355328][T10423] do_wp_page+0x5d8/0x16c0 [ 900.359861][T10423] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 900.365270][T10423] __handle_mm_fault+0x22e8/0x3ec0 [ 900.370497][T10423] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 900.376159][T10423] ? find_held_lock+0x35/0x130 [ 900.381111][T10423] ? handle_mm_fault+0x322/0xb30 [ 900.386335][T10423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.392598][T10423] ? kasan_check_read+0x11/0x20 [ 900.397824][T10423] handle_mm_fault+0x43f/0xb30 [ 900.398782][T10443] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 900.402611][T10423] __do_page_fault+0x5ef/0xda0 [ 900.402637][T10423] do_page_fault+0x71/0x581 [ 900.402660][T10423] ? page_fault+0x8/0x30 [ 900.425645][T10423] page_fault+0x1e/0x30 [ 900.429815][T10423] RIP: 0033:0x40af46 [ 900.433721][T10423] Code: e8 7f 66 ff ff 0f 1f 80 00 00 00 00 80 3d d1 50 53 00 00 75 06 80 7b 20 00 74 2e 8b 05 c7 50 53 00 c6 43 21 00 8d 70 ff 85 f6 <89> 35 b8 50 53 00 78 55 48 8b 44 24 08 64 48 33 04 25 28 00 00 00 [ 900.445385][T10446] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 900.453336][T10423] RSP: 002b:00007ffea61268d0 EFLAGS: 00010202 [ 900.453348][T10423] RAX: 0000000000000002 RBX: 000000000073bf00 RCX: 0000001b2e220000 [ 900.453356][T10423] RDX: 0000001b2d220000 RSI: 0000000000000001 RDI: 00000000870cb5eb [ 900.453363][T10423] RBP: 000000000073bf00 R08: ffffffff8100d7c9 R09: 0000000038f87a03 [ 900.453371][T10423] R10: 00007ffea61269c0 R11: 0000000000000246 R12: 000000000000068a 00:09:14 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) [ 900.453378][T10423] R13: 0000000000000000 R14: 0000000000000005 R15: 000000000073bf0c [ 900.453408][T10423] ? get_gate_vma+0x19/0xa0 [ 900.494648][T10448] FS-Cache: Duplicate cookie detected [ 900.520398][T10448] FS-Cache: O-cookie c=000000002d79f921 [p=00000000c2baab65 fl=222 nc=0 na=1] [ 900.529625][T10448] FS-Cache: O-cookie d= (null) n= (null) [ 900.537180][T10448] FS-Cache: O-key=[10] '02000200000002000000' [ 900.543921][T10448] FS-Cache: N-cookie c=0000000067dc3878 [p=00000000c2baab65 fl=2 nc=0 na=1] 00:09:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 900.552863][T10448] FS-Cache: N-cookie d=000000004dd2dd19 n=00000000d78e89c6 [ 900.560327][T10448] FS-Cache: N-key=[10] '02000200000002000000' [ 900.592655][T10454] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) [ 900.618796][T10423] memory: usage 307200kB, limit 307200kB, failcnt 56 [ 900.649365][T10423] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 00:09:15 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) [ 900.688369][T10423] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 900.695401][T10423] Memory cgroup stats for /syz2: cache:0KB rss:274204KB rss_huge:233472KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:91272KB active_anon:164788KB inactive_file:0KB active_file:12KB unevictable:18248KB [ 900.716461][T10464] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 900.755469][T10423] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8585,uid=0 [ 900.795457][T10468] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 900.831725][T10423] Memory cgroup out of memory: Killed process 8585 (syz-executor.2) total-vm:72580kB, anon-rss:18244kB, file-rss:34816kB, shmem-rss:0kB 00:09:15 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x0, 0x2dfffffff}, 0xc) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x4000) accept4(r1, &(0x7f0000000640)=@rc, &(0x7f0000000500)=0xfffffcbc, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x101080) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge_slave_1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000580), 0x4) lookup_dcookie(0x67a4, &(0x7f0000000200)=""/177, 0xb1) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000780)=""/246) lstat(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) execveat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000440)=[&(0x7f0000000180)='/dev/vhci\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='mime_type.\x00'], &(0x7f00000004c0), 0x400) syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x6806020}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x34, r4, 0xa01, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) utimes(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000540)={{0x0, 0x7530}}) 00:09:15 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:15 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:15 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) [ 901.260578][T10483] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 901.285182][T10480] FS-Cache: Duplicate cookie detected [ 901.290866][T10480] FS-Cache: O-cookie c=0000000028f85313 [p=00000000c2baab65 fl=222 nc=0 na=1] [ 901.299961][T10480] FS-Cache: O-cookie d=000000004dd2dd19 n=00000000f342ab72 00:09:15 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) [ 901.307523][T10480] FS-Cache: O-key=[10] '02000200000002000000' [ 901.314364][T10480] FS-Cache: N-cookie c=0000000048cad914 [p=00000000c2baab65 fl=2 nc=0 na=1] [ 901.325872][T10480] FS-Cache: N-cookie d=000000004dd2dd19 n=00000000da247861 [ 901.333299][T10480] FS-Cache: N-key=[10] '02000200000002000000' 00:09:15 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:15 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:15 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) [ 901.469091][T10484] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 00:09:16 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:16 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:16 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:16 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) [ 901.795266][ C0] net_ratelimit: 20 callbacks suppressed [ 901.795275][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 901.806993][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 901.812854][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 901.818826][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 901.824713][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 901.831471][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:16 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:16 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:16 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:16 executing program 0: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) 00:09:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc}]}}}]}, 0x3c}}, 0x0) [ 902.075754][T10521] netlink: 'syz-executor.4': attribute type 12 has an invalid length. 00:09:16 executing program 0: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) 00:09:16 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:16 executing program 2: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) [ 902.212504][T10521] netlink: 'syz-executor.4': attribute type 12 has an invalid length. 00:09:16 executing program 1: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) 00:09:16 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc}]}}}]}, 0x3c}}, 0x0) 00:09:16 executing program 0: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) 00:09:16 executing program 2: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) [ 902.373896][T10538] netlink: 'syz-executor.4': attribute type 12 has an invalid length. 00:09:16 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000480)=[0xee00]) mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000003c0)='fuse\x00', 0x1000020, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@audit='audit'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) mkdirat(r1, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, &(0x7f0000000100)={'ip_vti0\x00'}) connect$rose(0xffffffffffffffff, &(0x7f0000000200)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/f.le.\x00', 0xe, 0x2) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x5, 0x0, 0x4, 0x400000, {0x0, 0x7530}, {0x3, 0xa, 0x4, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0xe4, 0x4, @fd, 0x4}) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x0, 0x0, {0x3b00}}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000400)=0xa5) 00:09:17 executing program 1: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) 00:09:17 executing program 2: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) 00:09:17 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000140)={&(0x7f0000000040), 0x248, &(0x7f0000000080)={0x0, 0x353}}, 0x0) [ 902.674873][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 902.680758][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:17 executing program 0: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) 00:09:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc}]}}}]}, 0x3c}}, 0x0) 00:09:17 executing program 1: timerfd_create(0x7fe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) 00:09:17 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) [ 902.860157][T10562] netlink: 'syz-executor.4': attribute type 12 has an invalid length. 00:09:17 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc}]}}}]}, 0x3c}}, 0x0) 00:09:17 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) [ 903.289883][T10586] netlink: 'syz-executor.4': attribute type 12 has an invalid length. [ 903.314486][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 903.320397][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:17 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:17 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x2) 00:09:18 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x2) 00:09:18 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2001}, [@nested={0x8, 0x0, [@typed={0x4, 0x8, @binary}]}]}, 0x1c}}, 0x0) 00:09:18 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x2) 00:09:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2001}, [@nested={0x8, 0x0, [@typed={0x4, 0x8, @binary}]}]}, 0x1c}}, 0x0) 00:09:18 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x2) 00:09:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2001}, [@nested={0x8, 0x0, [@typed={0x4, 0x8, @binary}]}]}, 0x1c}}, 0x0) 00:09:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:18 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:18 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/f.le.\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000004b80)=""/4096) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r3, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r4}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 00:09:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x2001}, [@nested={0x8, 0x0, [@typed={0x4, 0x8, @binary}]}]}, 0x1c}}, 0x0) 00:09:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xbc, 0x4a}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 00:09:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_settime(0x884636b397a16f69, &(0x7f00000001c0)={0x77359400}) 00:09:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 00:09:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_settime(0x884636b397a16f69, &(0x7f00000001c0)={0x77359400}) 00:09:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xbc, 0x4a}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 00:09:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 00:09:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_settime(0x884636b397a16f69, &(0x7f00000001c0)={0x77359400}) 00:09:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 00:09:19 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) io_setup(0x101, &(0x7f0000000040)) 00:09:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) 00:09:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xbc, 0x4a}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 00:09:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_settime(0x884636b397a16f69, &(0x7f00000001c0)={0x77359400}) 00:09:19 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 00:09:19 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:19 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:19 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 00:09:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xbc, 0x4a}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 00:09:19 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:19 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) [ 905.541039][T10736] FS-Cache: Duplicate cookie detected [ 905.546734][T10736] FS-Cache: O-cookie c=00000000a9723938 [p=00000000c2baab65 fl=222 nc=0 na=1] [ 905.555744][T10736] FS-Cache: O-cookie d=000000004dd2dd19 n=000000006470d691 [ 905.563047][T10736] FS-Cache: O-key=[10] '02000200000002000000' [ 905.569712][T10736] FS-Cache: N-cookie c=0000000095e99e69 [p=00000000c2baab65 fl=2 nc=0 na=1] [ 905.578582][T10736] FS-Cache: N-cookie d=000000004dd2dd19 n=000000007cdb5e78 00:09:20 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:20 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) [ 905.585992][T10736] FS-Cache: N-key=[10] '02000200000002000000' 00:09:20 executing program 1: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:20 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) [ 906.070625][T10764] overlayfs: missing 'lowerdir' 00:09:20 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:20 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:20 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 00:09:21 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:21 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) [ 906.831257][T10794] net_ratelimit: 26 callbacks suppressed [ 906.831296][T10794] Dead loop on virtual device ip6_vti0, fix it urgently! [ 906.844886][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 906.850840][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:21 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:21 executing program 1: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:21 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:21 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:21 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:21 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:21 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) [ 907.474991][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 907.482244][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 907.489787][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 907.495763][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:22 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:22 executing program 2: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:22 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) [ 907.836539][T10812] Dead loop on virtual device ip6_vti0, fix it urgently! 00:09:22 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) [ 908.032487][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 908.038897][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:22 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:22 executing program 1: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:22 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:22 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:23 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:23 executing program 2: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:23 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:23 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:23 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:23 executing program 1: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:23 executing program 4: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:24 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:24 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:24 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:24 executing program 2: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) 00:09:24 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:24 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:24 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:24 executing program 4: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:25 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) read(r0, &(0x7f00000002c0)=""/217, 0xd9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES32], 0xffffff58) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 00:09:25 executing program 4: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:25 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:25 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:25 executing program 4: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:25 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, r1, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000a40)=0x7, &(0x7f0000000a80)=0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) ioctl$KVM_SMI(r4, 0xaeb7) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x0, 0x48a7, 0x0, 0x5, 0x60e, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000680)={0x6, 0x3ff, 0x0, 0xa9ba}) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000980)=""/52, 0x34}, {&(0x7f0000000240)=""/148, 0x94}, {0x0}], 0x3, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:09:25 executing program 4: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:25 executing program 5: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:25 executing program 0: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:25 executing program 3: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1275, &(0x7f0000000000)={[], 0x0, 0xbd, 0x279d}) 00:09:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f00000015c0)=@newspdinfo={0x1c, 0x24, 0x125, 0x0, 0x0, 0x0, [@ipv4_hthresh={0x8, 0x4, {0xf0}}]}, 0x1c}}, 0x0) 00:09:26 executing program 3: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:26 executing program 0: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:26 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) read(r0, &(0x7f00000002c0)=""/217, 0xd9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES32], 0xffffff58) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 00:09:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x30, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x12, 0x1, @ipv6=@loopback={0x4000000000000}}]}]}, 0x2c}}, 0x0) 00:09:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f00000015c0)=@newspdinfo={0x1c, 0x24, 0x125, 0x0, 0x0, 0x0, [@ipv4_hthresh={0x8, 0x4, {0xf0}}]}, 0x1c}}, 0x0) 00:09:26 executing program 5: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:26 executing program 0: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f00000015c0)=@newspdinfo={0x1c, 0x24, 0x125, 0x0, 0x0, 0x0, [@ipv4_hthresh={0x8, 0x4, {0xf0}}]}, 0x1c}}, 0x0) 00:09:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x30, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x12, 0x1, @ipv6=@loopback={0x4000000000000}}]}]}, 0x2c}}, 0x0) 00:09:26 executing program 3: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:26 executing program 5: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bf02f63cae436078389d34547180a5ef787b09175cfe2d23ab3c6b733c870e0a7647439b55f49a0f", 0x28, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000002680)=0x9f) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x7d5}}, 0x10) ptrace(0x10, r2) arch_prctl$ARCH_GET_CPUID(0x1011) fcntl$getflags(0xffffffffffffffff, 0x3) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x20000) 00:09:26 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) read(r0, &(0x7f00000002c0)=""/217, 0xd9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES32], 0xffffff58) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 00:09:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f00000015c0)=@newspdinfo={0x1c, 0x24, 0x125, 0x0, 0x0, 0x0, [@ipv4_hthresh={0x8, 0x4, {0xf0}}]}, 0x1c}}, 0x0) 00:09:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x30, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x12, 0x1, @ipv6=@loopback={0x4000000000000}}]}]}, 0x2c}}, 0x0) [ 912.200075][ C0] net_ratelimit: 24 callbacks suppressed [ 912.200085][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 912.224518][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 912.233927][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 912.239994][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 912.246138][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 912.252012][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:26 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) read(r0, &(0x7f00000002c0)=""/217, 0xd9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES32], 0xffffff58) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 00:09:26 executing program 3: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="9c3095e1bcfc264676e625a35ae0566fe7edb7d8b461da19abb87de708a3"], 0x1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x246) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0x117) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:09:26 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080)}, 0x68) socket$inet6_udp(0xa, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001440)={0x4c, 0x0, &(0x7f0000000340)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x3, 0x0, &(0x7f0000000440)="2c5bb5"}) 00:09:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x30, 0x829, 0x0, 0x0, {0x2802, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x12, 0x1, @ipv6=@loopback={0x4000000000000}}]}]}, 0x2c}}, 0x0) 00:09:26 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) read(r0, &(0x7f00000002c0)=""/217, 0xd9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES32], 0xffffff58) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 00:09:26 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080)}, 0x68) socket$inet6_udp(0xa, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001440)={0x4c, 0x0, &(0x7f0000000340)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x3, 0x0, &(0x7f0000000440)="2c5bb5"}) 00:09:26 executing program 4: r0 = memfd_create(&(0x7f0000000240)='m\x815\x1e9\xcf\xc2(\xa4\xc6r\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8000400) lseek(r0, 0x33, 0x1) 00:09:26 executing program 3: ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000600)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) 00:09:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:27 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080)}, 0x68) socket$inet6_udp(0xa, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001440)={0x4c, 0x0, &(0x7f0000000340)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x3, 0x0, &(0x7f0000000440)="2c5bb5"}) 00:09:27 executing program 4: r0 = memfd_create(&(0x7f0000000240)='m\x815\x1e9\xcf\xc2(\xa4\xc6r\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8000400) lseek(r0, 0x33, 0x1) 00:09:27 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) read(r0, &(0x7f00000002c0)=""/217, 0xd9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES32], 0xffffff58) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) 00:09:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:27 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080)}, 0x68) socket$inet6_udp(0xa, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001440)={0x4c, 0x0, &(0x7f0000000340)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x3, 0x0, &(0x7f0000000440)="2c5bb5"}) 00:09:27 executing program 4: r0 = memfd_create(&(0x7f0000000240)='m\x815\x1e9\xcf\xc2(\xa4\xc6r\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8000400) lseek(r0, 0x33, 0x1) 00:09:27 executing program 3: ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000600)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) 00:09:27 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) read(r0, &(0x7f00000002c0)=""/217, 0xd9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES32], 0xffffff58) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x20000000003, 0x0) [ 913.069659][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 913.075517][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:27 executing program 3: ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000600)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) 00:09:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:27 executing program 4: r0 = memfd_create(&(0x7f0000000240)='m\x815\x1e9\xcf\xc2(\xa4\xc6r\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8000400) lseek(r0, 0x33, 0x1) 00:09:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) [ 913.709369][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 913.715294][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:28 executing program 3: ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000600)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) 00:09:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000003c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047440, &(0x7f0000000000)) 00:09:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000040)=0xa9286bf7d4f2bb6a) 00:09:28 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:09:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:28 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000040)={0x0, 0x1, 0x0, [], 0x0}) poll(&(0x7f00000002c0)=[{r0, 0x8005}], 0x1, 0x0) 00:09:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000040)=0xa9286bf7d4f2bb6a) 00:09:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvfrom$unix(r1, &(0x7f0000000240)=""/163, 0xfffffffffffffdda, 0x0, 0x0, 0x0) 00:09:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000040)=0xa9286bf7d4f2bb6a) 00:09:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r2, 0x0, 0x0) 00:09:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000040)=0xa9286bf7d4f2bb6a) 00:09:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r2, 0x0, 0x0) 00:09:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000040)=0xa9286bf7d4f2bb6a) 00:09:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000040)=0xa9286bf7d4f2bb6a) 00:09:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000040)=0xa9286bf7d4f2bb6a) 00:09:29 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r2, 0x0, 0x0) 00:09:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x4001, &(0x7f0000001f00)={[{@inline_data='inline_data'}], [{@fowner_eq={'fowner'}}, {@fowner_gt={'fowner>'}}]}) 00:09:29 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000190007041dfffd946f610500020000001f00000000000800080015000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:09:29 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') write$cgroup_pid(r2, 0x0, 0x0) 00:09:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) [ 914.798273][T11103] netlink: 'syz-executor.4': attribute type 21 has an invalid length. 00:09:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:29 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) [ 914.861418][T11103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x7f, 0x0, &(0x7f00000000c0)=0x700) 00:09:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:29 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x0, 0x8000000013, 0x0, 0x0) 00:09:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x4000000000002, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) setpriority(0x0, 0x0, 0x0) 00:09:29 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x0, 0x8000000013, 0x0, 0x0) 00:09:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000190007041dfffd946f610500020000001f00000000000800080015000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:09:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x7f, 0x0, &(0x7f00000000c0)=0x700) 00:09:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:29 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x0, 0x8000000013, 0x0, 0x0) 00:09:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x7f, 0x0, &(0x7f00000000c0)=0x700) [ 915.460887][T11134] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 915.486209][T11140] netlink: 'syz-executor.4': attribute type 21 has an invalid length. 00:09:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 915.526456][T11140] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x0, 0x8000000013, 0x0, 0x0) 00:09:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000190007041dfffd946f610500020000001f00000000000800080015000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:09:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x7f, 0x0, &(0x7f00000000c0)=0x700) 00:09:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 915.684357][T11153] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 915.700244][T11153] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00007d9fc8)={0x0, 0x0, &(0x7f0000a40000)={&(0x7f0000b9e000)=@migrate={0xb8, 0x21, 0x411, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast1}}, [@migrate={0x5c, 0x11, [{@in6=@loopback, @in=@multicast2}, {@in6=@mcast1, @in6=@mcast1}]}, @policy_type={0xc, 0x10, {0x2}}]}, 0xb8}}, 0x0) 00:09:30 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)) 00:09:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000190007041dfffd946f610500020000001f00000000000800080015000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:09:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00007d9fc8)={0x0, 0x0, &(0x7f0000a40000)={&(0x7f0000b9e000)=@migrate={0xb8, 0x21, 0x411, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast1}}, [@migrate={0x5c, 0x11, [{@in6=@loopback, @in=@multicast2}, {@in6=@mcast1, @in6=@mcast1}]}, @policy_type={0xc, 0x10, {0x2}}]}, 0xb8}}, 0x0) 00:09:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) [ 916.249950][T11168] netlink: 'syz-executor.4': attribute type 21 has an invalid length. 00:09:30 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0xa2040, 0x0) 00:09:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00007d9fc8)={0x0, 0x0, &(0x7f0000a40000)={&(0x7f0000b9e000)=@migrate={0xb8, 0x21, 0x411, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast1}}, [@migrate={0x5c, 0x11, [{@in6=@loopback, @in=@multicast2}, {@in6=@mcast1, @in6=@mcast1}]}, @policy_type={0xc, 0x10, {0x2}}]}, 0xb8}}, 0x0) [ 916.293904][T11168] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00007d9fc8)={0x0, 0x0, &(0x7f0000a40000)={&(0x7f0000b9e000)=@migrate={0xb8, 0x21, 0x411, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast1}}, [@migrate={0x5c, 0x11, [{@in6=@loopback, @in=@multicast2}, {@in6=@mcast1, @in6=@mcast1}]}, @policy_type={0xc, 0x10, {0x2}}]}, 0xb8}}, 0x0) 00:09:30 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0xa2040, 0x0) 00:09:30 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0xa2040, 0x0) 00:09:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004740)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000008c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) 00:09:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000a0a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:09:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0xa2040, 0x0) 00:09:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004740)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000008c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) 00:09:31 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0xa2040, 0x0) 00:09:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111002, 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x104e21, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/16, 0xfd0f}], 0x1}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:31 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0xa2040, 0x0) 00:09:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004740)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000008c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) 00:09:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0xa2040, 0x0) [ 917.200223][T11200] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 917.213142][T11202] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 917.227539][ C0] net_ratelimit: 20 callbacks suppressed [ 917.227548][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 917.239082][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={0x0, 0x0, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x14, 0x15, 0xa, 0xfffffffffffffffd}, 0x14}}, 0x0) 00:09:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000a0a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:09:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004740)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000008c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) [ 917.408570][T11215] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 917.867268][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 917.873088][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 917.879029][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 917.884831][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) 00:09:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r3, {0xf}}}, 0x24}}, 0x0) 00:09:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={0x0, 0x0, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x14, 0x15, 0xa, 0xfffffffffffffffd}, 0x14}}, 0x0) 00:09:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x2}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:09:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000a0a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:09:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x7, 0x1c}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0xfffffffffffffffc, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) 00:09:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={0x0, 0x0, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x14, 0x15, 0xa, 0xfffffffffffffffd}, 0x14}}, 0x0) 00:09:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r3, {0xf}}}, 0x24}}, 0x0) 00:09:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x7, 0x1c}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0xfffffffffffffffc, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) [ 918.074053][T11221] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 00:09:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={0x0, 0x0, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x14, 0x15, 0xa, 0xfffffffffffffffd}, 0x14}}, 0x0) 00:09:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000a0a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 00:09:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) 00:09:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x7, 0x1c}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0xfffffffffffffffc, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) 00:09:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x7, 0x800032, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000001300), &(0x7f0000000100)=0x60) 00:09:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r3, {0xf}}}, 0x24}}, 0x0) 00:09:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x7, 0x1c}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0xfffffffffffffffc, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) [ 918.318921][T11254] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 00:09:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) 00:09:32 executing program 4: ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000eaffac1414aa0000000040000000113c04a23743f008499547b50000000000"], 0x37}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x20008000) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:09:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) [ 918.427879][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 918.434466][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 918.441505][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 918.447926][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) pipe(0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000140)={{0x0, 0x2}, 0x0, 0x0, 0x0, {0x0, 0x9}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) [ 918.881189][T11251] device team0 entered promiscuous mode [ 918.913994][T11251] device team_slave_0 entered promiscuous mode [ 918.960032][T11251] device team_slave_1 entered promiscuous mode [ 918.980026][T11251] 8021q: adding VLAN 0 to HW filter on device team0 [ 919.033231][T11251] device team0 left promiscuous mode [ 919.038791][T11251] device team_slave_0 left promiscuous mode [ 919.044804][T11251] device team_slave_1 left promiscuous mode [ 919.104195][T11274] device team0 entered promiscuous mode [ 919.109983][T11274] device team_slave_0 entered promiscuous mode [ 919.123483][T11274] device team_slave_1 entered promiscuous mode [ 919.131641][T11274] 8021q: adding VLAN 0 to HW filter on device team0 00:09:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:33 executing program 4: ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000eaffac1414aa0000000040000000113c04a23743f008499547b50000000000"], 0x37}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x20008000) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:09:33 executing program 0: ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000eaffac1414aa0000000040000000113c04a23743f008499547b50000000000"], 0x37}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x20008000) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:09:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) pipe(0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000140)={{0x0, 0x2}, 0x0, 0x0, 0x0, {0x0, 0x9}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 00:09:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r3, {0xf}}}, 0x24}}, 0x0) 00:09:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x7, 0x800032, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000001300), &(0x7f0000000100)=0x60) 00:09:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x7, 0x800032, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000001300), &(0x7f0000000100)=0x60) 00:09:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:33 executing program 4: ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000eaffac1414aa0000000040000000113c04a23743f008499547b50000000000"], 0x37}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x20008000) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:09:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) pipe(0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000140)={{0x0, 0x2}, 0x0, 0x0, 0x0, {0x0, 0x9}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) [ 919.344739][T11286] device team0 left promiscuous mode [ 919.379157][T11286] device team_slave_0 left promiscuous mode 00:09:33 executing program 0: ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000eaffac1414aa0000000040000000113c04a23743f008499547b50000000000"], 0x37}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x20008000) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 919.397876][T11286] device team_slave_1 left promiscuous mode 00:09:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) pipe(0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000140)={{0x0, 0x2}, 0x0, 0x0, 0x0, {0x0, 0x9}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) [ 919.862666][T11290] device team0 entered promiscuous mode [ 919.873056][T11290] device team_slave_0 entered promiscuous mode [ 919.883463][T11290] device team_slave_1 entered promiscuous mode [ 919.905592][T11290] 8021q: adding VLAN 0 to HW filter on device team0 [ 919.932568][T11289] device team0 left promiscuous mode 00:09:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:34 executing program 4: ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000eaffac1414aa0000000040000000113c04a23743f008499547b50000000000"], 0x37}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x20008000) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:09:34 executing program 0: ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000eaffac1414aa0000000040000000113c04a23743f008499547b50000000000"], 0x37}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x20008000) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:09:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x7, 0x800032, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000001300), &(0x7f0000000100)=0x60) 00:09:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x7, 0x800032, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000001300), &(0x7f0000000100)=0x60) [ 920.274232][T11297] device team0 entered promiscuous mode [ 920.282919][T11297] 8021q: adding VLAN 0 to HW filter on device team0 00:09:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:34 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:34 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:35 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:35 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 921.178980][T11311] device team0 left promiscuous mode [ 921.184330][T11311] device team_slave_0 left promiscuous mode [ 921.191572][T11311] device team_slave_1 left promiscuous mode [ 921.266181][T11313] device team0 entered promiscuous mode [ 921.272074][T11313] device team_slave_0 entered promiscuous mode [ 921.286552][T11313] device team_slave_1 entered promiscuous mode [ 921.295081][T11313] 8021q: adding VLAN 0 to HW filter on device team0 [ 921.309879][T11314] device team0 entered promiscuous mode 00:09:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:35 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) [ 921.325454][T11314] device team_slave_0 entered promiscuous mode [ 921.337630][T11314] device team_slave_1 entered promiscuous mode [ 921.354787][T11314] 8021q: adding VLAN 0 to HW filter on device team0 00:09:35 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x7, 0x800032, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000001300), &(0x7f0000000100)=0x60) [ 921.583026][T11319] device team0 entered promiscuous mode [ 921.605820][T11319] device team_slave_0 entered promiscuous mode [ 921.635537][T11319] device team_slave_1 entered promiscuous mode [ 921.667204][T11319] 8021q: adding VLAN 0 to HW filter on device team0 00:09:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:36 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 921.898817][T11324] device team0 left promiscuous mode 00:09:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:36 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 921.991900][T11326] device team0 entered promiscuous mode [ 922.000352][T11326] 8021q: adding VLAN 0 to HW filter on device team0 [ 922.013801][T11353] device team0 left promiscuous mode [ 922.023586][T11353] device team_slave_0 left promiscuous mode [ 922.042984][T11353] device team_slave_1 left promiscuous mode 00:09:36 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:36 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 922.467052][T11355] device team0 left promiscuous mode [ 922.472790][T11355] device team_slave_0 left promiscuous mode [ 922.488912][T11355] device team_slave_1 left promiscuous mode [ 922.585714][ C0] net_ratelimit: 20 callbacks suppressed [ 922.585756][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 922.598972][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 922.606817][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 922.613942][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 922.621651][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 922.628256][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 922.645501][T11356] device team0 entered promiscuous mode [ 922.651334][T11356] device team_slave_0 entered promiscuous mode [ 922.676043][T11356] device team_slave_1 entered promiscuous mode [ 922.691022][T11356] 8021q: adding VLAN 0 to HW filter on device team0 [ 922.699535][T11358] device team0 entered promiscuous mode [ 922.711088][T11358] device team_slave_0 entered promiscuous mode [ 922.733831][T11358] device team_slave_1 entered promiscuous mode 00:09:37 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 922.769337][T11358] 8021q: adding VLAN 0 to HW filter on device team0 [ 922.792492][T11373] device team0 left promiscuous mode [ 922.798374][T11373] device team_slave_0 left promiscuous mode 00:09:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x7, 0x800032, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000001300), &(0x7f0000000100)=0x60) 00:09:37 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) [ 922.829603][T11373] device team_slave_1 left promiscuous mode 00:09:37 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 923.070094][T11376] device team0 entered promiscuous mode [ 923.099348][T11376] device team_slave_0 entered promiscuous mode 00:09:37 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 923.150857][T11376] device team_slave_1 entered promiscuous mode [ 923.166384][T11376] 8021q: adding VLAN 0 to HW filter on device team0 [ 923.185078][T11380] device team0 left promiscuous mode 00:09:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000380)='syzkaller\x00', 0x0, &(0x7f0000000400)='mime_type\x81]keyring\x00', 0xfffffffffffffffb) getuid() getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0), 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\x00\x00\x00\x00`\x00'}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x8, 0x0, 0x0, 0x0, 'syz0\x00', 0x8}, 0x2, 0x614, 0x5, 0x0, 0x0, 0x0, 'syz1\x00', 0x0, 0x0, [], [0xfffffffffffffffc, 0x0, 0x8, 0x8]}) setsockopt$rose(r1, 0x104, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\a\x03\x00\x02\xff', 0x4bfd}) 00:09:37 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 923.465661][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 923.472478][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 923.531120][T11384] device team0 entered promiscuous mode [ 923.539983][T11384] 8021q: adding VLAN 0 to HW filter on device team0 [ 923.585634][T11402] device team0 left promiscuous mode [ 923.591280][T11402] device team_slave_0 left promiscuous mode 00:09:38 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:38 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:38 executing program 2: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:38 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 923.629070][T11402] device team_slave_1 left promiscuous mode 00:09:38 executing program 2: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:38 executing program 5: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:38 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) [ 924.070176][T11407] device team0 entered promiscuous mode [ 924.076545][T11407] device team_slave_0 entered promiscuous mode [ 924.083738][T11407] device team_slave_1 entered promiscuous mode [ 924.100576][T11407] 8021q: adding VLAN 0 to HW filter on device team0 [ 924.107405][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 924.107500][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:38 executing program 1: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:38 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:38 executing program 2: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) [ 924.131546][T11422] device team0 left promiscuous mode [ 924.140156][T11422] device team_slave_0 left promiscuous mode [ 924.160184][T11422] device team_slave_1 left promiscuous mode [ 924.404516][T11425] device team0 entered promiscuous mode [ 924.410115][T11425] device team_slave_0 entered promiscuous mode [ 924.434002][T11425] device team_slave_1 entered promiscuous mode [ 924.441345][T11425] 8021q: adding VLAN 0 to HW filter on device team0 00:09:38 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:38 executing program 5: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:38 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:38 executing program 2: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:38 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r0) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) r1 = open(&(0x7f0000000000)='./file1\x00', 0x200, 0x100) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x2) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', &(0x7f00000005c0)={'L+', 0x10001}, 0x28, 0x1) setsockopt(r1, 0x10000, 0x9, &(0x7f0000000240)="af5599314318e02ed5f5c5dbc8247075838ed3dec3650208a803f3eedf9e7749c205c592096c06512778d845a762c816a58b07d4b766183a7e3203f254e738f33b4d", 0x42) readlink(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000780)=@v2={0x2000000, [{0xe24, 0xffff}, {0x2}]}, 0x14, 0x1) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 00:09:38 executing program 1: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:39 executing program 1: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:39 executing program 5: r0 = socket$inet(0x2, 0x4000004000000001, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000300), 0x4) recvmmsg(r0, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/55, 0x37}], 0x1}}], 0x1, 0x0, 0x0) 00:09:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2283, &(0x7f0000000000)) 00:09:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x8aet/r\x1cX\xe9\x92\x8f\x18\x19\x93\xe7\x15aw6\b') accept4$alg(r0, 0x0, 0x0, 0x3a746a040441c9df) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0x0, 0xb00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 00:09:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2283, &(0x7f0000000000)) 00:09:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2283, &(0x7f0000000000)) 00:09:39 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x8aet/r\x1cX\xe9\x92\x8f\x18\x19\x93\xe7\x15aw6\b') accept4$alg(r0, 0x0, 0x0, 0x3a746a040441c9df) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0x0, 0xb00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 00:09:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x8aet/r\x1cX\xe9\x92\x8f\x18\x19\x93\xe7\x15aw6\b') accept4$alg(r0, 0x0, 0x0, 0x3a746a040441c9df) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0x0, 0xb00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 00:09:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x8aet/r\x1cX\xe9\x92\x8f\x18\x19\x93\xe7\x15aw6\b') accept4$alg(r0, 0x0, 0x0, 0x3a746a040441c9df) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0x0, 0xb00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 00:09:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2283, &(0x7f0000000000)) 00:09:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x8aet/r\x1cX\xe9\x92\x8f\x18\x19\x93\xe7\x15aw6\b') accept4$alg(r0, 0x0, 0x0, 0x3a746a040441c9df) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0x0, 0xb00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 00:09:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f0000001000fffffd3b54c007110000f30501000b000200000000000300cf", 0x1f) 00:09:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f0000001000fffffd3b54c007110000f30501000b000200000000000300cf", 0x1f) 00:09:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x8aet/r\x1cX\xe9\x92\x8f\x18\x19\x93\xe7\x15aw6\b') accept4$alg(r0, 0x0, 0x0, 0x3a746a040441c9df) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0x0, 0xb00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 00:09:39 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f0000001000fffffd3b54c007110000f30501000b000200000000000300cf", 0x1f) 00:09:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x8aet/r\x1cX\xe9\x92\x8f\x18\x19\x93\xe7\x15aw6\b') accept4$alg(r0, 0x0, 0x0, 0x3a746a040441c9df) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x8906, 0x0, 0xb00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 00:09:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:39 executing program 4: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:39 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f0000001000fffffd3b54c007110000f30501000b000200000000000300cf", 0x1f) 00:09:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:09:39 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) 00:09:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) write$cgroup_int(r3, &(0x7f0000000000), 0xfdef) 00:09:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x3, 0x0, 0x0, 0x0, {0x30, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr=0x2000000, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 00:09:40 executing program 4: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:40 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 925.673700][T11543] bond0: Releasing backup interface bond_slave_1 00:09:40 executing program 1: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x3, 0x0, 0x0, 0x0, {0x30, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr=0x2000000, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 00:09:40 executing program 4: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x3, 0x0, 0x0, 0x0, {0x30, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr=0x2000000, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 00:09:40 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:40 executing program 1: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 926.550501][T11549] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 926.562293][T11573] bond0: Releasing backup interface bond_slave_1 00:09:41 executing program 4: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x3, 0x0, 0x0, 0x0, {0x30, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr=0x2000000, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 00:09:41 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:41 executing program 1: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:09:41 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 926.654393][T11570] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:09:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 926.880348][T11590] bond0: Releasing backup interface bond_slave_1 00:09:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:09:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:09:41 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:41 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:41 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:41 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:41 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 927.646516][ C0] net_ratelimit: 20 callbacks suppressed [ 927.646565][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 927.659088][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:42 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 927.738409][T11591] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 927.765477][T11599] bond0: Releasing backup interface bond_slave_1 00:09:42 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:42 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 927.988800][T11606] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 928.000763][T11607] bond0: Releasing backup interface bond_slave_1 00:09:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 928.169883][T11610] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 928.204373][T11611] bond0: Releasing backup interface bond_slave_1 [ 928.262001][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 928.268222][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 928.274139][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 928.280115][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:09:42 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:42 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 928.320442][T11612] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 928.347282][T11627] bond0: Releasing backup interface bond_slave_1 00:09:42 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:43 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 928.584517][T11628] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:09:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 928.629614][T11635] bond0: Releasing backup interface bond_slave_1 00:09:43 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:43 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 928.989330][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 928.995665][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 929.002312][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 929.009169][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:43 executing program 2: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) 00:09:43 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 929.036732][T11636] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 929.054619][T11640] bond0: Releasing backup interface bond_slave_1 00:09:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:09:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 929.260307][T11646] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 929.282922][T11670] bond0: Releasing backup interface bond_slave_1 [ 929.413273][T11649] bond0: Releasing backup interface bond_slave_1 00:09:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000200)={0x1f, r2, 0x2}, 0xc) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x9, 0x100000001, 0x9, 0x10001, 0x4, 0x2, 0x1c, "f8acd0657547dfe81ec264f96861b0de55dcecd0", "613f382ee831299335844d34bc888fbdb47b398b"}) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\xf0', @random="01003a1e2410"}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f0000000040)={'ip6tnl0\x00', 0xdd}) socket$inet(0x2b, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000000)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00!\x01\a\x00\x00\x00L\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:09:43 executing program 2: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:43 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0xfffffffffffffffe) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) keyctl$join(0x1, &(0x7f0000000280)={'syz'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x4, 0x8, 0x6, 0x7fffffff, 0x0, 0x2, 0x9, 0x0, 0xfffffffffffffff9, 0xdb, 0x0, 0x5, 0x4082, 0x0, 0xcb, 0x0, 0x6f, 0xe5fe, 0xdab, 0x32b4e660, 0x5, 0x8, 0x6, 0xff1, 0x8, 0x1f0, 0x3ff, 0x8, 0xe52, 0x400, 0x0, 0xf090a9b, 0x2, @perf_bp={0x0, 0x1}, 0x304, 0x0, 0x4, 0x3, 0x6, 0x7fffffff, 0x7ff}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0x8) r0 = open(&(0x7f0000000240)='./file0\x00', 0x41, 0x80) write$UHID_INPUT2(r0, &(0x7f0000000280)=ANY=[], 0x0) wait4(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = msgget(0x1, 0x420) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000540)=""/239) sendto$unix(r0, &(0x7f0000000740)="f28e34c494e33f30393278282ea81bb13e934f80d230b30eb221d822f55153e4681aa85a20391d5b8cb3fa8878151a0b82fe0aa5dba2ff1a24d0ffee66685ee65a1cff0d63322d389d42d585e92d1f309cf10fde43a59a4f58edc21751acffe13612ae3d6fb0090ddfe180bfbc50960a67a44b648caa2cbd14d870be58603a77b935f96954d1840f66a4c4ecd95f9700016773c698b1bf5d9578aac8ba2f24be561ad1675c6b130e24cdc28a6b4744051671c7e9b112ca895270dd599622f0311a3fd5191359526cf87a87d118dd1e1331bcef5400569fccd9c905d0", 0xdc, 0x14, 0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x8c', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1f, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2}}}, 0x118) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) socket$pptp(0x18, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001600)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4040040}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)={[{@journal_checksum='j%urnal_checksum'}]}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xb6, &(0x7f00000002c0)="8838f99f1624c49eb8a05b84748a7b4edac1aec4f8857f0ab3f94cfe1d28e74f21645d91a2a683376c2207b58a37bae91bc4c25e0074cd90e527356277294f7ee5ca190d93512f115097359d26d135f60384a76beefffac7dab3d756aad25a91b21c3270fbd71a2b0aec313a6089a2e65bffcfb6b561a5e1be0904b74b04d334393c4c30358439a1e0a3b8540dbcb460752a0d70b84052ba9639dd72a11a226fdd"}) [ 929.540809][T11652] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 929.554464][T11662] bond0: Releasing backup interface bond_slave_1 [ 929.789630][T11663] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 929.812876][T11671] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:09:44 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x6}) [ 929.837363][T11675] bond0: Releasing backup interface bond_slave_1 00:09:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000130009006900000000000000ab0080480b00000046000107000000141900040000000000010003f5169dcd4a77282b0bdca4000000", 0x39}], 0x1) 00:09:44 executing program 2: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:44 executing program 5: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:44 executing program 2: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:44 executing program 5: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) [ 930.269703][T11676] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 930.302362][T11687] bond0: Releasing backup interface bond_slave_1 00:09:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 2: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 930.567573][T11688] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 930.586533][T11694] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 00:09:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 5: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000130009006900000000000000ab0080480b00000046000107000000141900040000000000010003f5169dcd4a77282b0bdca4000000", 0x39}], 0x1) 00:09:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 930.798470][T11730] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 00:09:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000130009006900000000000000ab0080480b00000046000107000000141900040000000000010003f5169dcd4a77282b0bdca4000000", 0x39}], 0x1) 00:09:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 930.969046][T11741] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 00:09:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="39000000130009006900000000000000ab0080480b00000046000107000000141900040000000000010003f5169dcd4a77282b0bdca4000000", 0x39}], 0x1) 00:09:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 931.118606][T11751] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 00:09:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 4: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:45 executing program 4: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:45 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) dup(r0) 00:09:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) 00:09:46 executing program 4: socket$alg(0x26, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syncfs(r0) keyctl$join(0x1, &(0x7f0000000780)={'syz'}) 00:09:46 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) dup(r0) 00:09:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) sendmsg$unix(r1, 0x0, 0x81) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 00:09:46 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) dup(r0) 00:09:46 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) dup(r0) 00:09:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) 00:09:46 executing program 3: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:46 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:09:46 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) dup(r0) 00:09:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) 00:09:46 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) dup(r0) 00:09:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:46 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) dup(r0) 00:09:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) 00:09:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:47 executing program 3: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) [ 933.140359][ C0] net_ratelimit: 20 callbacks suppressed [ 933.140403][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 933.152999][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 933.159993][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 933.166052][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 933.173337][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 933.179803][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:47 executing program 1: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:48 executing program 3: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 933.860196][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 933.866929][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:48 executing program 1: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0x1, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 00:09:48 executing program 3: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 934.499008][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 934.504890][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:49 executing program 3: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:49 executing program 4: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) 00:09:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) 00:09:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, 0x0) 00:09:49 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) 00:09:49 executing program 1: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) 00:09:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) 00:09:50 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) 00:09:50 executing program 3: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:50 executing program 4: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) 00:09:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_gstrings={0x1b, 0x5}}) 00:09:50 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) 00:09:50 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:50 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:50 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:50 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:50 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:51 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:51 executing program 3: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:51 executing program 4: setrlimit(0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0xfffffde0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 00:09:51 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:51 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:51 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:51 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:51 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:51 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:51 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:52 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) [ 938.656852][ C1] net_ratelimit: 22 callbacks suppressed [ 938.656862][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 938.668443][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 938.674310][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 938.680174][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:53 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) 00:09:53 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:53 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:53 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) 00:09:53 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:53 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:53 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) 00:09:53 executing program 1: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) [ 939.388095][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 939.394472][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 939.401533][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 939.408334][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 939.416413][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 939.423348][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x800000002, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@empty, r2}, 0x14) 00:09:54 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r1, 0x0, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) r4 = msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(r4, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) keyctl$assume_authority(0x10, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r5}) 00:09:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000007d01000000420000000000000000000000000800000000000000e248aae905000000060000000700000000000000040047504c000000040047504c00070070707031656d312f579053c0211fe0862002000000284eaed06cdae00c14cedc69126c8b4ad857224581acaaaa8f2b71904e0ed899ea91ff37c7eb54b76dea68262a9442c29f9790f83496b169be3ac28418bfe8372dc892a8d1c25d519bcbeb984810a444ff3a6c451b0910b8242721f945b3186a928d1cbfa03ed153230856e43167075adb83d94a9b08e470299ded049bc69be9c7ac89509ca614b45ef94111a128ea3a331aac4fbb53471fa4004545a7c65763ef3c1d5bb8b125fb5784b61ebf23eefc5e256844a84a9f672994fb239f8b756d52d1b97a28843b4a8d"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:54 executing program 1: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) 00:09:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x800000002, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@empty, r2}, 0x14) 00:09:54 executing program 1: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) 00:09:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x800000002, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@empty, r2}, 0x14) 00:09:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:09:54 executing program 1: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) 00:09:54 executing program 2: r0 = socket$inet6(0xa, 0x800000002, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@empty, r2}, 0x14) 00:09:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:09:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:55 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x80044dfd, 0x0) 00:09:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) 00:09:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000007d01000000420000000000000000000000000800000000000000e248aae905000000060000000700000000000000040047504c000000040047504c00070070707031656d312f579053c0211fe0862002000000284eaed06cdae00c14cedc69126c8b4ad857224581acaaaa8f2b71904e0ed899ea91ff37c7eb54b76dea68262a9442c29f9790f83496b169be3ac28418bfe8372dc892a8d1c25d519bcbeb984810a444ff3a6c451b0910b8242721f945b3186a928d1cbfa03ed153230856e43167075adb83d94a9b08e470299ded049bc69be9c7ac89509ca614b45ef94111a128ea3a331aac4fbb53471fa4004545a7c65763ef3c1d5bb8b125fb5784b61ebf23eefc5e256844a84a9f672994fb239f8b756d52d1b97a28843b4a8d"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000007d01000000420000000000000000000000000800000000000000e248aae905000000060000000700000000000000040047504c000000040047504c00070070707031656d312f579053c0211fe0862002000000284eaed06cdae00c14cedc69126c8b4ad857224581acaaaa8f2b71904e0ed899ea91ff37c7eb54b76dea68262a9442c29f9790f83496b169be3ac28418bfe8372dc892a8d1c25d519bcbeb984810a444ff3a6c451b0910b8242721f945b3186a928d1cbfa03ed153230856e43167075adb83d94a9b08e470299ded049bc69be9c7ac89509ca614b45ef94111a128ea3a331aac4fbb53471fa4004545a7c65763ef3c1d5bb8b125fb5784b61ebf23eefc5e256844a84a9f672994fb239f8b756d52d1b97a28843b4a8d"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000007d01000000420000000000000000000000000800000000000000e248aae905000000060000000700000000000000040047504c000000040047504c00070070707031656d312f579053c0211fe0862002000000284eaed06cdae00c14cedc69126c8b4ad857224581acaaaa8f2b71904e0ed899ea91ff37c7eb54b76dea68262a9442c29f9790f83496b169be3ac28418bfe8372dc892a8d1c25d519bcbeb984810a444ff3a6c451b0910b8242721f945b3186a928d1cbfa03ed153230856e43167075adb83d94a9b08e470299ded049bc69be9c7ac89509ca614b45ef94111a128ea3a331aac4fbb53471fa4004545a7c65763ef3c1d5bb8b125fb5784b61ebf23eefc5e256844a84a9f672994fb239f8b756d52d1b97a28843b4a8d"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000007d01000000420000000000000000000000000800000000000000e248aae905000000060000000700000000000000040047504c000000040047504c00070070707031656d312f579053c0211fe0862002000000284eaed06cdae00c14cedc69126c8b4ad857224581acaaaa8f2b71904e0ed899ea91ff37c7eb54b76dea68262a9442c29f9790f83496b169be3ac28418bfe8372dc892a8d1c25d519bcbeb984810a444ff3a6c451b0910b8242721f945b3186a928d1cbfa03ed153230856e43167075adb83d94a9b08e470299ded049bc69be9c7ac89509ca614b45ef94111a128ea3a331aac4fbb53471fa4004545a7c65763ef3c1d5bb8b125fb5784b61ebf23eefc5e256844a84a9f672994fb239f8b756d52d1b97a28843b4a8d"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000007d01000000420000000000000000000000000800000000000000e248aae905000000060000000700000000000000040047504c000000040047504c00070070707031656d312f579053c0211fe0862002000000284eaed06cdae00c14cedc69126c8b4ad857224581acaaaa8f2b71904e0ed899ea91ff37c7eb54b76dea68262a9442c29f9790f83496b169be3ac28418bfe8372dc892a8d1c25d519bcbeb984810a444ff3a6c451b0910b8242721f945b3186a928d1cbfa03ed153230856e43167075adb83d94a9b08e470299ded049bc69be9c7ac89509ca614b45ef94111a128ea3a331aac4fbb53471fa4004545a7c65763ef3c1d5bb8b125fb5784b61ebf23eefc5e256844a84a9f672994fb239f8b756d52d1b97a28843b4a8d"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000007d01000000420000000000000000000000000800000000000000e248aae905000000060000000700000000000000040047504c000000040047504c00070070707031656d312f579053c0211fe0862002000000284eaed06cdae00c14cedc69126c8b4ad857224581acaaaa8f2b71904e0ed899ea91ff37c7eb54b76dea68262a9442c29f9790f83496b169be3ac28418bfe8372dc892a8d1c25d519bcbeb984810a444ff3a6c451b0910b8242721f945b3186a928d1cbfa03ed153230856e43167075adb83d94a9b08e470299ded049bc69be9c7ac89509ca614b45ef94111a128ea3a331aac4fbb53471fa4004545a7c65763ef3c1d5bb8b125fb5784b61ebf23eefc5e256844a84a9f672994fb239f8b756d52d1b97a28843b4a8d"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000007d01000000420000000000000000000000000800000000000000e248aae905000000060000000700000000000000040047504c000000040047504c00070070707031656d312f579053c0211fe0862002000000284eaed06cdae00c14cedc69126c8b4ad857224581acaaaa8f2b71904e0ed899ea91ff37c7eb54b76dea68262a9442c29f9790f83496b169be3ac28418bfe8372dc892a8d1c25d519bcbeb984810a444ff3a6c451b0910b8242721f945b3186a928d1cbfa03ed153230856e43167075adb83d94a9b08e470299ded049bc69be9c7ac89509ca614b45ef94111a128ea3a331aac4fbb53471fa4004545a7c65763ef3c1d5bb8b125fb5784b61ebf23eefc5e256844a84a9f672994fb239f8b756d52d1b97a28843b4a8d"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 0: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:09:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 00:09:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00\x00\x00\x00\x00\x02\xbe\xa1\xac', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="286e6a8d6980"}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f0000000180)="020400000300603900382b8a5b5aa242b90516da4d23a3bb09f82632e33715d26206cd6b80a7699507938207", 0x2c, 0x0, 0x0, 0x0) 00:09:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0x8}, 0x10) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sched_yield() futex(&(0x7f0000000500)=0x2, 0x9, 0x1, &(0x7f0000000300)={r1, r2+30000000}, &(0x7f0000000380)=0x1, 0x2) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$netlink(r3, 0x10e, 0x40000, &(0x7f0000000880)=""/156, &(0x7f0000000940)=0x9c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x9}]}, 0x10) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = fcntl$dupfd(r0, 0x406, r0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e20, @multicast1}, 0x10) statx(r4, &(0x7f0000000440)='./file0\x00', 0x6400, 0x200, &(0x7f0000000b40)) sendto$inet(r0, &(0x7f0000000600)="c99a98f6f3490805f2c08465ff7cf97fe2953d6304d217543f6f3f448f28e95818c042", 0x23, 0x4, 0x0, 0x0) fcntl$getown(r0, 0x9) write$P9_RGETLOCK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="d4fdffff370700003cead743a181eeff01000000a56a00000000000000000000000000"], 0x23) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000680)={0x0, 'veth1_to_bridge\x00', 0x408000}, 0x18) write$P9_RLCREATE(r4, &(0x7f0000000400)={0xfcca, 0xf, 0x2, {{0x1}, 0x7}}, 0xffffff25) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5}, 0x48) ioperm(0xefd, 0x800, 0x4) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xa) write$P9_RSTAT(r4, 0x0, 0x6ec1f560ee6b811d) write$P9_RSTAT(r4, &(0x7f0000000540)={0x4d, 0x7d, 0x2, {0x0, 0x2a, 0x101, 0x0, {0x0, 0x3, 0x3}, 0x140000, 0x5, 0xffffffff, 0xfff, 0x4, 'ppp0', 0x4, 'GPL\x00', 0x0, '', 0xb, 'vmnet1wlan1'}}, 0x4d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) write$P9_RSTAT(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x120) accept4(r4, &(0x7f00000001c0)=@xdp, &(0x7f0000000080)=0x80, 0x80800) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 00:09:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x21, &(0x7f0000000000), 0x3c) 00:09:57 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 00:09:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 00:09:57 executing program 0: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:09:57 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 00:09:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x21, &(0x7f0000000000), 0x3c) 00:09:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 00:09:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00\x00\x00\x00\x00\x02\xbe\xa1\xac', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="286e6a8d6980"}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f0000000180)="020400000300603900382b8a5b5aa242b90516da4d23a3bb09f82632e33715d26206cd6b80a7699507938207", 0x2c, 0x0, 0x0, 0x0) 00:09:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 00:09:58 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 00:09:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x21, &(0x7f0000000000), 0x3c) 00:09:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00\x00\x00\x00\x00\x02\xbe\xa1\xac', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="286e6a8d6980"}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f0000000180)="020400000300603900382b8a5b5aa242b90516da4d23a3bb09f82632e33715d26206cd6b80a7699507938207", 0x2c, 0x0, 0x0, 0x0) 00:09:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00\x00\x00\x00\x00\x02\xbe\xa1\xac', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="286e6a8d6980"}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f0000000180)="020400000300603900382b8a5b5aa242b90516da4d23a3bb09f82632e33715d26206cd6b80a7699507938207", 0x2c, 0x0, 0x0, 0x0) 00:09:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x21, &(0x7f0000000000), 0x3c) 00:09:58 executing program 0: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:09:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00\x00\x00\x00\x00\x02\xbe\xa1\xac', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="286e6a8d6980"}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f0000000180)="020400000300603900382b8a5b5aa242b90516da4d23a3bb09f82632e33715d26206cd6b80a7699507938207", 0x2c, 0x0, 0x0, 0x0) 00:09:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00\x00\x00\x00\x00\x02\xbe\xa1\xac', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="286e6a8d6980"}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f0000000180)="020400000300603900382b8a5b5aa242b90516da4d23a3bb09f82632e33715d26206cd6b80a7699507938207", 0x2c, 0x0, 0x0, 0x0) 00:09:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00\x00\x00\x00\x00\x02\xbe\xa1\xac', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="286e6a8d6980"}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f0000000180)="020400000300603900382b8a5b5aa242b90516da4d23a3bb09f82632e33715d26206cd6b80a7699507938207", 0x2c, 0x0, 0x0, 0x0) 00:09:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 0: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:09:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 944.254647][ C0] net_ratelimit: 24 callbacks suppressed [ 944.254656][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 944.266221][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:09:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:59 executing program 0: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:09:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x21, &(0x7f0000000000), 0x3c) 00:09:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x21, &(0x7f0000000000), 0x3c) [ 944.893674][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 944.900158][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 944.906167][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 944.912913][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:09:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x200000000000000f) 00:09:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 00:09:59 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:09:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x21, &(0x7f0000000000), 0x3c) 00:09:59 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:09:59 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgr_up/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000100)}, 0x1e) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x1c99ea87a8acb6ef) pipe(0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0xffffff11) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000480)='dctcp\x00N\xc7\xfcd\xf7\x8a\x06\xa2>k;\x9eOP\xe1?\xe4\xe2R>\xec\xd3;\x80\x9f\x92\x8d;>\xee\xb8[w\n\xa7M\n\xec\xe8t\xf4{3f\x97\xf8?\xee\x93$T\xc1\xd4N8\xd6\a\x10%=\xc6G\xc2\xa0\xfe]Q\x01Bd\\\xe2\x05i$\xb5\xf9|T\x16Hy\xb4\x9f\xa2i\xe0s\x14\x9c\xefDn\xb2y\x86\xa7]\x81\t\x9e\x86\xb3z\xb5\xf5dQ6\xaf\xab\x938-SL\xa0.\xd5V\x95g\xbax\x9b-W\x06\xd3{\x92\x8d=\x18\xbe$\x88*}\xaf\x12f\x93\xde\x00\x01~m\x95\xe9\x11\xbd\x8c\xa9\xfb\xbe}\xdc\x05}+\xa3q\xf0\xa8\xfe\x16.\xf42ZI,\f3{\xd8I\x84\xdb\xd2\x1er\x93\xe58z\x94\xfb\xc3\x8c\xd9Gj\xd6\x18\a\'\xc1w|u/\x9a6\xc2\x03,8\x9f9\xe3u\x846\x06\x191a\\\xcb\x17\xf9\x1f\xda\xb8\x80B!\x9d~\xde', 0xee) ioctl(r1, 0x3f, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x200004e23}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x80000000, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0xffffffffffffff6e) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) accept4(r2, 0x0, 0x0, 0x800) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xffffff27) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet(r1, &(0x7f00000003c0)="c3401c344654f3c7d9b41ba48c8e319aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0001c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='cubic\x00', 0x6) shutdown(r1, 0x1) 00:09:59 executing program 0: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:09:59 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:09:59 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:09:59 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:09:59 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:09:59 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:10:00 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) [ 945.613348][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 945.619209][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 945.625132][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 945.630939][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:10:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:10:00 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:10:00 executing program 0: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:10:00 executing program 5: r0 = socket$packet(0x11, 0x10000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2282, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:10:00 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:10:00 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:10:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:10:00 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) 00:10:00 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0xd40beb2474dfd229, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xfea, 0x20, 0x1, 0x0, 0x4}) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) syz_open_dev$sndpcmc(0x0, 0x100, 0x101000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0xffff}) syz_init_net_socket$x25(0x9, 0x5, 0x0) 00:10:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x3d}, [@ldst={0x5, 0xc0ffffff, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x3e5, &(0x7f000000cf3d)=""/195}, 0x185) 00:10:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r1, r2}) dup2(r0, r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000140)={r1}) [ 946.353056][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 946.353072][ T27] audit: type=1800 audit(1552954200.768:598): pid=12429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17825 res=0 00:10:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, 0x0, &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'dummy0\x00', 'team_slave_0\x00', 'syzkaller0\x00', 'rose0\x00', @dev, [], @link_local, [], 0xb0, 0xb0, 0xe8, [@statistic={'statistic\x00', 0x18, {{0x2}}}]}}, @snat={'snat\x00', 0x10}}]}]}, 0x1f0) 00:10:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000140)) [ 946.427673][ T27] audit: type=1804 audit(1552954200.818:599): pid=12429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir873705973/syzkaller.uKJAYo/1775/file0" dev="sda1" ino=17825 res=1 00:10:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x3d}, [@ldst={0x5, 0xc0ffffff, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x3e5, &(0x7f000000cf3d)=""/195}, 0x185) 00:10:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000140)) 00:10:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000140)) 00:10:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x3d}, [@ldst={0x5, 0xc0ffffff, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x3e5, &(0x7f000000cf3d)=""/195}, 0x185) 00:10:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, 0x0, &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'dummy0\x00', 'team_slave_0\x00', 'syzkaller0\x00', 'rose0\x00', @dev, [], @link_local, [], 0xb0, 0xb0, 0xe8, [@statistic={'statistic\x00', 0x18, {{0x2}}}]}}, @snat={'snat\x00', 0x10}}]}]}, 0x1f0) 00:10:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r1, r2}) dup2(r0, r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000140)={r1}) 00:10:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r1, r2}) dup2(r0, r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000140)={r1}) [ 947.236952][ T27] audit: type=1804 audit(1552954201.658:600): pid=12436 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir873705973/syzkaller.uKJAYo/1775/file0" dev="sda1" ino=17825 res=1 [ 948.067597][T12436] syz-executor.0 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 948.079160][T12436] CPU: 0 PID: 12436 Comm: syz-executor.0 Not tainted 5.1.0-rc1-next-20190318 #5 [ 948.088375][T12436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.098724][T12436] Call Trace: [ 948.102053][T12436] dump_stack+0x172/0x1f0 [ 948.106422][T12436] dump_header+0x10f/0xb6c [ 948.111771][T12436] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 948.117640][T12436] ? ___ratelimit+0x60/0x595 [ 948.122693][T12436] ? do_raw_spin_unlock+0x57/0x270 [ 948.127918][T12436] oom_kill_process.cold+0x10/0x15 [ 948.134109][T12436] out_of_memory+0x79a/0x1280 [ 948.138823][T12436] ? lockdep_hardirqs_on+0x418/0x5d0 [ 948.144960][T12436] ? trace_hardirqs_on_caller+0x6a/0x220 [ 948.150639][T12436] ? lock_downgrade+0x880/0x880 [ 948.157343][T12436] ? oom_killer_disable+0x280/0x280 [ 948.162775][T12436] mem_cgroup_out_of_memory+0x1ca/0x230 [ 948.170138][T12436] ? memcg_event_wake+0x230/0x230 [ 948.175639][T12436] ? _raw_spin_unlock+0x2d/0x50 [ 948.181498][T12436] try_charge+0x118d/0x1790 [ 948.186294][T12436] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 948.191974][T12436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 948.198247][T12436] ? kasan_check_read+0x11/0x20 [ 948.203124][T12436] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 948.208690][T12436] mem_cgroup_try_charge+0x24d/0x5e0 [ 948.214008][T12436] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 948.219814][T12436] shmem_getpage_gfp+0x69e/0x2500 [ 948.225062][T12436] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 948.232497][T12436] ? mark_held_locks+0xa4/0xf0 [ 948.237278][T12436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.242749][T12436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.248919][T12436] ? lockdep_hardirqs_on+0x418/0x5d0 [ 948.254318][T12436] shmem_fault+0x22d/0x760 [ 948.258761][T12436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.264323][T12436] ? shmem_read_mapping_page_gfp+0x1a0/0x1a0 [ 948.270328][T12436] ? retint_kernel+0x2d/0x2d [ 948.274955][T12436] __do_fault+0x116/0x4e0 [ 948.279321][T12436] __handle_mm_fault+0x2c6c/0x3ec0 [ 948.284468][T12436] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 948.290037][T12436] ? find_held_lock+0x35/0x130 [ 948.294818][T12436] ? handle_mm_fault+0x322/0xb30 [ 948.299786][T12436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 948.306054][T12436] ? kasan_check_read+0x11/0x20 [ 948.310930][T12436] handle_mm_fault+0x43f/0xb30 [ 948.315801][T12436] __get_user_pages+0x7b6/0x1a40 [ 948.321383][T12436] ? lockdep_hardirqs_on+0x418/0x5d0 [ 948.327320][T12436] ? follow_page_mask+0x19a0/0x19a0 [ 948.332827][T12436] populate_vma_page_range+0x20d/0x2a0 [ 948.338329][T12436] __mm_populate+0x204/0x380 [ 948.342959][T12436] ? populate_vma_page_range+0x2a0/0x2a0 [ 948.349172][T12436] vm_mmap_pgoff+0x213/0x230 [ 948.353792][T12436] ? vma_is_stack_for_current+0xd0/0xd0 [ 948.359386][T12436] ? kasan_check_read+0x11/0x20 [ 948.364322][T12436] ? _copy_to_user+0xc9/0x120 [ 948.369031][T12436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 948.375300][T12436] ksys_mmap_pgoff+0xf7/0x630 [ 948.379992][T12436] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 948.385821][T12436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.391390][T12436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.396993][T12436] ? do_syscall_64+0x26/0x610 [ 948.401720][T12436] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.407978][T12436] __x64_sys_mmap+0xe9/0x1b0 [ 948.412613][T12436] do_syscall_64+0x103/0x610 [ 948.417253][T12436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.423162][T12436] RIP: 0033:0x458079 [ 948.427065][T12436] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.447697][T12436] RSP: 002b:00007faa2e1c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 948.456143][T12436] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458079 [ 948.464832][T12436] RDX: 0000000000000002 RSI: 0000000000b36000 RDI: 0000000020000000 [ 948.472825][T12436] RBP: 000000000073bfa0 R08: ffffffffffffffff R09: 0000000000000000 [ 948.480933][T12436] R10: 0000000000008031 R11: 0000000000000246 R12: 00007faa2e1c46d4 [ 948.488923][T12436] R13: 00000000004c3d43 R14: 00000000004d6f38 R15: 00000000ffffffff [ 948.497182][T12436] memory: usage 307200kB, limit 307200kB, failcnt 203 [ 948.504310][T12436] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 948.512075][T12436] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 948.519480][T12436] Memory cgroup stats for /syz0: cache:14960KB rss:253568KB rss_huge:202752KB shmem:14896KB mapped_file:3432KB dirty:0KB writeback:0KB swap:0KB inactive_anon:58292KB active_anon:210368KB inactive_file:40KB active_file:16KB unevictable:4KB [ 948.543526][T12436] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8642,uid=0 [ 948.559621][T12436] Memory cgroup out of memory: Killed process 8642 (syz-executor.0) total-vm:72580kB, anon-rss:18244kB, file-rss:34816kB, shmem-rss:0kB [ 1052.259848][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1052.267108][ C0] rcu: 0-...!: (10455 ticks this GP) idle=f56/1/0x4000000000000002 softirq=102153/102153 fqs=36 [ 1052.278675][ C0] rcu: (t=10500 jiffies g=155861 q=450) [ 1052.284421][ C0] rcu: rcu_preempt kthread starved for 10427 jiffies! g155861 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 1052.295697][ C0] rcu: RCU grace-period kthread stack dump: [ 1052.301596][ C0] rcu_preempt R running task 29168 10 2 0x80000000 [ 1052.309702][ C0] Call Trace: [ 1052.313029][ C0] __schedule+0x817/0x1cc0 [ 1052.317555][ C0] ? __sched_text_start+0x8/0x8 [ 1052.322425][ C0] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1052.328517][ C0] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1052.333822][ C0] ? trace_hardirqs_on+0x67/0x230 [ 1052.339135][ C0] schedule+0x92/0x180 [ 1052.343225][ C0] schedule_timeout+0x4db/0xfd0 [ 1052.348097][ C0] ? usleep_range+0x170/0x170 [ 1052.352791][ C0] ? trace_hardirqs_on+0x67/0x230 [ 1052.357831][ C0] ? kasan_check_read+0x11/0x20 [ 1052.362797][ C0] ? __next_timer_interrupt+0x1a0/0x1a0 [ 1052.368811][ C0] ? prepare_to_swait_exclusive+0x120/0x120 [ 1052.375543][ C0] rcu_gp_kthread+0x962/0x17b0 [ 1052.380370][ C0] ? kasan_check_write+0x14/0x20 [ 1052.385339][ C0] ? wait_rcu_exp_gp+0x50/0x50 [ 1052.390135][ C0] ? trace_hardirqs_on+0x67/0x230 [ 1052.395173][ C0] ? kasan_check_read+0x11/0x20 [ 1052.400040][ C0] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1052.405860][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1052.412198][ C0] ? __kthread_parkme+0xfb/0x1b0 [ 1052.417164][ C0] kthread+0x357/0x430 [ 1052.421249][ C0] ? wait_rcu_exp_gp+0x50/0x50 [ 1052.426021][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1052.432276][ C0] ret_from_fork+0x3a/0x50 [ 1052.436719][ C0] NMI backtrace for cpu 0 [ 1052.441056][ C0] CPU: 0 PID: 12436 Comm: syz-executor.0 Not tainted 5.1.0-rc1-next-20190318 #5 [ 1052.450079][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.460154][ C0] Call Trace: [ 1052.463446][ C0] [ 1052.466320][ C0] dump_stack+0x172/0x1f0 [ 1052.470772][ C0] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1052.475987][ C0] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1052.481642][ C0] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1052.487642][ C0] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1052.493647][ C0] rcu_dump_cpu_stacks+0x183/0x1cf [ 1052.498867][ C0] rcu_sched_clock_irq.cold+0x500/0xa4a [ 1052.504482][ C0] ? raise_softirq+0x11f/0x310 [ 1052.509443][ C0] update_process_times+0x32/0x80 [ 1052.514534][ C0] tick_sched_handle+0xa2/0x190 [ 1052.519399][ C0] tick_sched_timer+0x47/0x130 [ 1052.524173][ C0] __hrtimer_run_queues+0x33e/0xde0 [ 1052.529413][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 1052.534744][ C0] ? hrtimer_start_range_ns+0xc80/0xc80 [ 1052.540320][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1052.546052][ C0] ? ktime_get_update_offsets_now+0x2d9/0x440 [ 1052.552133][ C0] hrtimer_interrupt+0x314/0x770 [ 1052.557106][ C0] smp_apic_timer_interrupt+0x120/0x570 [ 1052.562758][ C0] apic_timer_interrupt+0xf/0x20 [ 1052.567695][ C0] [ 1052.570649][ C0] RIP: 0010:debug_lockdep_rcu_enabled.part.0+0x2a/0x60 [ 1052.577512][ C0] Code: 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 53 65 48 8b 1c 25 00 ee 01 00 48 8d bb 7c 08 00 00 48 89 fa 48 c1 ea 03 0f b6 14 02 <48> 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 10 8b 93 7c 08 00 [ 1052.597128][ C0] RSP: 0018:ffff888212a06e00 EFLAGS: 00000a03 ORIG_RAX: ffffffffffffff13 [ 1052.605550][ C0] RAX: dffffc0000000000 RBX: ffff888089d24440 RCX: 1ffffffff12bcc8f [ 1052.613618][ C0] RDX: 0000000000000000 RSI: ffffffff8191279d RDI: ffff888089d24cbc [ 1052.621595][ C0] RBP: ffff888212a06e08 R08: ffff888089d24440 R09: ffffed101379a194 [ 1052.629579][ C0] R10: ffffed101379a193 R11: ffff88809bcd0c9f R12: 0000000000000001 [ 1052.637561][ C0] R13: 0000000000000001 R14: 0000000000000008 R15: 0000000000000002 [ 1052.645561][ C0] ? inactive_list_is_low+0x33d/0x690 [ 1052.650948][ C0] debug_lockdep_rcu_enabled+0x71/0xa0 [ 1052.656411][ C0] inactive_list_is_low+0x350/0x690 [ 1052.661630][ C0] shrink_node_memcg+0x7d2/0x16b0 [ 1052.666672][ C0] ? shrink_active_list+0x14c0/0x14c0 [ 1052.672060][ C0] ? kasan_check_read+0x11/0x20 [ 1052.676924][ C0] ? mem_cgroup_iter+0x45e/0xb00 [ 1052.681868][ C0] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1052.687164][ C0] ? retint_kernel+0x2d/0x2d [ 1052.691770][ C0] ? mem_cgroup_iter+0x45e/0xb00 [ 1052.696734][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1052.702204][ C0] shrink_node+0x287/0x1660 [ 1052.706736][ C0] ? shrink_node_memcg+0x16b0/0x16b0 [ 1052.712045][ C0] do_try_to_free_pages+0x3cb/0x11e0 [ 1052.717370][ C0] ? shrink_node+0x1660/0x1660 [ 1052.723598][ C0] ? _raw_spin_unlock_irq+0x54/0x90 [ 1052.728840][ C0] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1052.734053][ C0] try_to_free_mem_cgroup_pages+0x2dd/0xa30 [ 1052.739965][ C0] ? try_to_free_pages+0x8b0/0x8b0 [ 1052.745094][ C0] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1052.750919][ C0] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1052.756749][ C0] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1052.762640][ C0] ? cgroup_file_notify+0x140/0x1b0 [ 1052.767857][ C0] try_charge+0x5bd/0x1790 [ 1052.772292][ C0] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1052.777845][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.784100][ C0] ? kasan_check_read+0x11/0x20 [ 1052.788965][ C0] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1052.794535][ C0] mem_cgroup_try_charge+0x24d/0x5e0 [ 1052.799843][ C0] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1052.805592][ C0] shmem_getpage_gfp+0x69e/0x2500 [ 1052.810659][ C0] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 1052.817879][ C0] ? mark_held_locks+0xa4/0xf0 [ 1052.822655][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1052.828125][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1052.833681][ C0] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1052.838982][ C0] shmem_fault+0x22d/0x760 [ 1052.843412][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1052.848887][ C0] ? shmem_read_mapping_page_gfp+0x1a0/0x1a0 [ 1052.854884][ C0] ? retint_kernel+0x2d/0x2d [ 1052.859958][ C0] __do_fault+0x116/0x4e0 [ 1052.864322][ C0] __handle_mm_fault+0x2c6c/0x3ec0 [ 1052.869458][ C0] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1052.875013][ C0] ? find_held_lock+0x35/0x130 [ 1052.879825][ C0] ? handle_mm_fault+0x322/0xb30 [ 1052.884780][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1052.891034][ C0] ? kasan_check_read+0x11/0x20 [ 1052.895899][ C0] handle_mm_fault+0x43f/0xb30 [ 1052.900675][ C0] __get_user_pages+0x7b6/0x1a40 [ 1052.905643][ C0] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1052.911131][ C0] ? follow_page_mask+0x19a0/0x19a0 [ 1052.916350][ C0] populate_vma_page_range+0x20d/0x2a0 [ 1052.921843][ C0] __mm_populate+0x204/0x380 [ 1052.926467][ C0] ? populate_vma_page_range+0x2a0/0x2a0 [ 1052.932134][ C0] vm_mmap_pgoff+0x213/0x230 [ 1052.936765][ C0] ? vma_is_stack_for_current+0xd0/0xd0 [ 1052.942339][ C0] ? kasan_check_read+0x11/0x20 [ 1052.947290][ C0] ? _copy_to_user+0xc9/0x120 [ 1052.951985][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1052.958245][ C0] ksys_mmap_pgoff+0xf7/0x630 [ 1052.962941][ C0] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 1052.968603][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1052.974090][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1052.979583][ C0] ? do_syscall_64+0x26/0x610 [ 1052.984381][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1052.990573][ C0] __x64_sys_mmap+0xe9/0x1b0 [ 1052.995187][ C0] do_syscall_64+0x103/0x610 [ 1052.999971][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.005873][ C0] RIP: 0033:0x458079 [ 1053.009785][ C0] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1053.029420][ C0] RSP: 002b:00007faa2e1c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1053.037945][ C0] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458079 [ 1053.045935][ C0] RDX: 0000000000000002 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1053.054011][ C0] RBP: 000000000073bfa0 R08: ffffffffffffffff R09: 0000000000000000 [ 1053.062088][ C0] R10: 0000000000008031 R11: 0000000000000246 R12: 00007faa2e1c46d4 [ 1053.070169][ C0] R13: 00000000004c3d43 R14: 00000000004d6f38 R15: 00000000ffffffff